<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1626328370711236&amp;ev=PageView&amp;noscript=1">
banner-blog.jpg

blog

How Isolation Would Have Stopped The Russian Election Cyberattacks

Posted by Jay Kelley on Jul 19, 2018

Regardless of the political fall-out from Special Counsel Robert J. Mueller’s indictment of twelve Russian intelligence operatives for tampering with the 2016 U.S. Presidential election, this much seems clear after reading the 29-page, John LeCarre-like document: It has become unreasonable to expect any organization to successfully defend against such a massive, coordinated cyberattack.

Read More

Tags: malware, phishing, isolation, credential theft, spear-phishing, remote browsing, cyberattacks, browser isolation, presidential election, Russian hackers, Russian operatives, Russian intelligence, DNC, DCCC, Podesta, cryptojacking, X-Agent, Mueller, U.S. election, GRU, Clinton Campaign, Democratic National Committee, Democratic Congressional Campaign Committee, Clinton, cryptocurrency

Compromised Websites and Download Bomb Attacks

Posted by Andrew Prince on Jul 11, 2018

Compromised Websites and Download Bomb Attacks

In recent weeks a resurgence of download bomb attacks has been observed in the wild, attempting to add legitimacy to malicious websites serving a tech support based phishing scam. For users of Menlo Security’s Isolation Platform (MSIP), this attack is trivially defeated with zero malicious content reaching the end user’s device. However, the same may not be said for reputation based security, as we review below.

Read More

Tags: malware, phishing, isolation, javascript, compromised websites, download bomb

Isolation: really making it 'FIN' for FIN7

Posted by Jay Kelley on Apr 10, 2018

It was reported on April 1st – appropriate that it was April Fool’s Day – by a number of media outlets that Hudson’s Bay Company, the Canada-based parent company of iconic luxury retailer Saks Fifth Avenue, as well as Lord & Taylor and Saks Off 5th, had been hacked. Reportedly, over 5 million credit and debit card numbers of customers of the retailers had been stolen, and supposedly were for sale on the Dark Web.

Read More

Tags: hacked, hackers, phishing attack, cyber security, isolation technology, browser isolation

Don’t Be a Wildebeest

Posted by Kowsik Guruswamy on Mar 29, 2018

 On the Serengeti, wildebeest have survived for millennia by using a simple strategy: safety in numbers. It’s great for the species, but each animal can only hope that another one will take one for the team.  

 

Read More

Tags: browser-based attacks, remote browsers, cyberattacks, isolation platform, trust, "risky web", safe web

Love and malware

Posted by Jay Kelley on Feb 14, 2018

 

 

“Love is like a virus. It can happen to anybody at any time.” – Maya Angelou

 

It’s Valentine’s Day, and love is in the air.

 

Unfortunately, so are emails riddled with malware.

Read More

Tags: malware, cyber security, isolation technology, isolation platform, virus

 A New Approach to End Typosquatting

Posted by Jay Kelley on Feb 13, 2018

 

 “Simplicity is the ultimate sophistication.” – Leonardo da Vinci

 

This quote even holds true when it comes to cyber threats.

 

While experts discuss the impending battle royal between cybersecurity, and attackers and hackers, focusing in on “good AI” vs. “evil AI” in an ever-escalating, highly-sophisticated cyber arms race, it’s sometimes the simplest of threats – and mistakes – that can be the most dangerous and frustrating.

Read More

Tags: cyber security, isolation technology, typosquatting

Isolating Meltdown & Spectre

Posted by Jason Steer on Jan 9, 2018

2018 has barely started and we've already got our first big major security vulnerabilities of the year, with the media generating lots of deserved attention worldwide on them. In case you missed the news, two major CPU vulnerabilities have been disclosed by Google and several other researchers: Meltdown and Spectre

Read More

Tags: browser-based attacks, remote browsers, web-based vulnerabilities, isolation technology

10 Reasons Why You Shouldn't Consider Isolation

Posted by Jay Kelley on Dec 7, 2017

 

While this post is intended to be a little tongue-in-cheek for readers, it’s been written to provoke discussion on how organizations continue to do the same things they have done for the last 15 years, without thinking of all the issues they bring with them…

Read More

Tags: phishing, isolation, ransomware, spear-phishing, web isolation, malvertising

Lights, Camera, Cyber Attack!

Posted by Jay Kelley on Dec 5, 2017

 

The past few years, the major studios and production companies that create movies, broadcast television, streaming content, and even online and video games have been under cyber attack.

Read More

Tags: malware, isolation, ransomware, malicious code, cyber attacks, phishing attack

Cyber Monday: Going Phishing?

Posted by Jay Kelley on Nov 21, 2017

 

The holiday shopping season kicks off this week with Black Friday (November 24 th) and Cyber Monday (November 27 th). And, if it’s any indication of how much online shopping will occur, last year (2016), Cyber Monday set a new sales record of $3.45 billion USD!
Read More

Tags: malware, phishing, isolation, cyber attacks, isolation platform, cyber Monday, Black Friday

Connect with us

Lists by Topic

see all

Recent Posts

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.