<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1626328370711236&amp;ev=PageView&amp;noscript=1">
banner-blog.jpg

blog

Manipulating Democracy by Spearphishing Candidates

Posted by Jay Kelley on Jun 7, 2017

Recent news is all about election hacking, with the publication this week by The Intercept of a top-secret report from the U.S. National Security Agency (NSA), detailing how Russian military intelligence or state-sponsored attackers – or, maybe as Russian President Vladimir Putin stated in a recent interview, “patriotically minded” private Russian hackers – launched a multi-pronged phishing and spearphishing attack on voter registration during the 2016 U.S. presidential elections.

Read More

Tags: cybersecurity, isolation, anti-phishing, spear-phishing, cyber attacks, infosec euope

Email Phishing and Web Malware: Still the Same

Posted by Jason Steer on May 31, 2017

It’s 2017, and many organisations are still grappling with solving two of the biggest routes of attack into their business from the Internet - via their employees' in-boxes and web browsers. 

Read More

Tags: cybersecurity, isolation, credential theft, anti-phishing, spear-phishing, cyber attacks, infosec euope

Is Your Web Viewing Dangerous? Over 350k Web Sites Run Vulnerable Software

Posted by Peter Lunk on May 25, 2017

Over 350,000 of the world’s top 1 million web sites may be running vulnerable software --  which the recent WannaCry cyber attack has shown can spell considerable risk of hacker exploitation. According to the Menlo Security State of The Web report, software on some web sites dates back to over a decade ago, as far back as the year 2000. The cyber security research reveals that nearly half (46%) of the Internet’s top 1 million web sites, as ranked by Alexa, are risky, and that 1 in 5 domains run vulnerable software.

Read More

Tags: isolation, ransomware, credential theft, malware vulnerabilities, phishing prevention, spear-phishing, banks, cyber attacks, wannacry, hackers, financial security firms, credit unions, web threats, email threats

Phishing & Whaling at FS-ISAC

Posted by Jay Kelley on May 22, 2017

Exhibiting at the recent FS-ISAC Annual Summit 2017 at the Dolphin Convention Center (which could have doubled as a meat locker at times because it was so cold, while other times it could have been a large sauna it was so hot and steamy!), there was a mini-monsoon outside at one point. It was like Mother Nature was mimicking the downpour of cyber attacks confronting the financial services players at the event. It was a deluge! 

Read More

Tags: malware, cybersecurity, isolation, ransomware, credential theft, financial services, drive-by exploits, spear-phishing, cyber attacks, FS-ISAC Annual Summit 2017

The (Human) Face of Ransomware

Posted by Jay Kelley on May 19, 2017

When you start to realize the scope and impact the ransomware attack that began on Friday, May 12, 2017, and continued to roll onward into last weekend had not only a huge negative effect on businesses and their operations, but on everyday people, it begins to become all too real.

Read More

Tags: phishing, isolation, ransomware, drive-by exploits, spear-phishing, cyber attacks, Telefonica, Vodafone, Gas Natural, watering hole attacks, wannacry

Detecting the Undetectable - The Punycode Homograph Attack

Posted by Jason Steer on Apr 25, 2017

Another week, another web security story where organisations need to consider how to defend against another phishing attack. 

Read More

Tags: cybersecurity, isolation, anti-phishing, phishing prevention, state of the web, remote browsing, browser-based attacks, cyber attacks, punycode

State of Cyber Security in the Middle East

Posted by Jason Steer on Mar 24, 2017

dubai.png

I just spent a week in several new geographical markets for Menlo Security, the United Arab Emirates and Qatar, meeting and talking to new and existing customers. Online risks are no different in the Middle East than they are in the USA, Asia or Europe. The risks may have different names, but the impact remains the same.

Read More

Tags: isolation, credential theft, malware vulnerabilities, spear-phishing, Qatar, United Arab Emirates, Shamoon attack, cyber attacks

Connect with us

Lists by Topic

see all

Recent Posts