banner-blog.jpg

blog

Secure O365 and Secure G Suite for Your Enterprise

Posted by James Locus on Mar 9, 2020

Bad actors never rest

Creating legitimate-looking fake communications from Google or Microsoft is easy and inexpensive. Novice attackers with little or no coding experience can purchase phishing packs on the dark web that they can customize and then send emails to specific targets based on social engineering intelligence. Free and compromised accounts can also be used as an attack vector , hosting documents that contain malware or links to fake web forms or other malicious sites.

Read More

Tags: email attachments, email threats, malicious links, Isolation Core

Stop Data Exfiltration with Cloud DLP

Posted by James Locus on Mar 5, 2020

Introducing cloud-based data loss prevention with Menlo Security

Sensitive data leaving a company via the web is a major concern for many networks. Bad actors perpetrate 69 percent of external data breach attacks and represent the largest threat to organizations that are not using cloud isolation. For our customers, however, we prevent these attacks.

Because external actors frequently rely on phishing and malware insertion, Menlo Security customers are largely protected through our browser and email isolation. The remaining threat vector then moves to the company’s own employees.

Read More

Tags: Isolation Core, Cloud Proxy, Cloud DLP

Menlo Security Moves to Larger Headquarters to Accommodate Growth!

Posted by Rosie Fantozzi on Mar 2, 2020

How exciting! Today we moved into the second floor of 800 W. El Camino in Mountain View! We’re excited to announce that, because of remarkable growth over the last seven years, Menlo Security is expanding. This is a reflection of what we’re doing and have been doing—relentlessly on eradicating malware from Web and Email.

Read More

Tags: Menlo Growth, NewOffice

Menlo Security Stands behind Its security—Announces $1 Million Malware Protection Warranty

Posted by Mehul Patel on Feb 26, 2020

Today we announced security without compromise. Menlo Security is offering a warranty of up to $1 million to any customer that experiences an infection from malware that passes through our Isolation Core™. This warranty is the first of its kind from a cloud proxy company, a category that includes some very large, public companies who have thousands of customers. 

Read More

Tags: Web Security, Isolation Core, Cloud Proxy, Anti-Malware

Emotet attacks— a spike to start the year...

The Emotet malware is a very destructive banking Trojan that was first identified in 2014. Over the years it has evolved with new capabilities and functionalities, prompting cybersecurity agencies like the Australian Cyber Security Centre and US-CERT to issue advisories. Emotet malware generally spreads via malicious documents that drop a modular Trojan bot, which is used to download and install additional remote access tools. We wrote a blog post in January 2019 about how the malware had changed tactics, leading to a spike in the number of Emotet malware attacks. In the last week, we have observed a spike in the number of Emotet malware transactions across our customer base. US-CERT has also issued a fresh advisory regarding the recent spate of attacks. 

Read More

Tags: Web Security, CVE, emotet

IE and FIREFOX-Patching nightmare begins in 2020...

Posted by Vinay Pidathala on Jan 27, 2020

Not all vulnerabilities are created equal. It’s true. In a perfect world, organizations should be able to patch every vulnerability on every client immediately. But we don’t live in a perfect world. Some vulnerabilities pose a much greater risk to the organization than others and should be prioritized.

Read More

Tags: Web Security, ZeroTrust, Internet Isolation, CVE

Menlo Security Protects Organizations from Iranian Retaliation

Posted by Young-Sae Song on Jan 24, 2020

As warfare extends to cyberspace, U.S.-based organizations can use email and web isolation to protect users from common tactics used by Iranian-backed threat actors.

Read More

Tags: phishing prevention, Web Security, ZeroTrust Internet, CBII

Gartner Report on Remote Browser Isolation: Menlo Security’s Continued Validation

Posted by Mehul Patel on Jan 7, 2020

In October 2018, Gartner released a report on remote browser isolation. It ruffled feathers a bit throughout the cybersecurity industry by suggesting that enterprises can no longer assume that their traditional detect-and-respond security strategy was enough to stop all web-based malware attacks. Analyst Neil MacDonald argued that enterprises should stop trying to detect every attack and instead focus on “containing the ability of the attacker to cause damage and reduce the surface area for attack.”

Read More

Tags: gartner, remote browsers, Secure Web Access

Financial Services Get Hooked, Experience 147% Increase in Phishing Clicks

Posted by Vinay Pidathala on Dec 17, 2019

According to JPMorgan Chase CEO Jamie Dimon, “The threat of cyber security may very well be the biggest threat to the US financial system.” Coupled with the fact that financial services is one of the most highly targeted industries, it’s clear financial organizations are in trouble.  Reports show a 56% year-over-year increase in digital threats targeting the sector, and according to new research, phishing is a key threat vector.

Read More

Tags: phishing attack

How to Mitigate Phishing Threats inYour Organization

Posted by Kowsik Guruswamy on Dec 5, 2019

From a bad actor perspective, phishing is the cheapest and easiest way to infiltrate organizations and personal information
to make a profit. By nature, humans are curious and are oft en overconfident when it comes to security. Phishing is an even greater threat for mobile users, too. Without key visual cues, like the ability to hover over a link to determine its destination, it is much easier for a user to make the simple mistake of clicking a bad link and falling victim to a phishing attempt. The popularity of social media has also made it much easier for hackers to find valid email addresses and research users’
life activities to create sophisticated, tailored phishing attacks.  From a security perspective, there are typically three approaches to solving the phishing problem – email security gateways, web proxies and security training awareness – but each has its own limitations.

Read More

Tags: phishing, email attachments, anti-phishing, phishing prevention, Google Docs email scam, email threats

Connect with us

Lists by Topic

see all

Recent Posts