<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1626328370711236&amp;ev=PageView&amp;noscript=1">
banner-blog.jpg

blog

Oh, JavaScript – You Devil!

Posted by Jason Steer on Oct 31, 2017

I think we’ve blogged a few times now on the risks of JavaScript and the role it plays in browser-based cyber attacks. We’ve recently seen the details of the Pornhub attack, where malicious adverts were used to target users visiting the Pornhub website and served up fake browser updates as another in a very long list of malvertising attacks.

Read More

Tags: javascript, cyber threats, coinhive, cyber attacks, isolation technology

You Are a Bad Rabbit!

Posted by Jason Steer on Oct 26, 2017

It’s another day and another cyber attack headline in the media. This time it’s another ransomware-style attack; this one is called “Bad Rabbit”. According to media reports, it has impacted organizations in Russia and Ukraine mostly, with reports of some businesses in Turkey and Germany (and possibly in Poland and Japan) also being affected (that we know of so far).

Read More

Tags: ransomware, bad rabbit, credential theft, javascript, isolation technology, web isolation, cyber threats

Isolate ALL: Unlocking Isolation's Full Potential

Posted by Greg Maudsley on Oct 19, 2017

Threat isolation is fast becoming the new “must-have” technology for IT security teams. It has gained recognition from leading analysts, and enterprise adoption is taking off. Case-in-point, Menlo Security now has hundreds-of-thousands of users across the globe using isolation to access the web without worry of malware infections. What is of particular importance is that 90% of these Menlo Security customers are isolating ALL of their web traffic, which unlocks isolation’s full potential. So why is this significant? 

Read More

Tags: cyber security, isolation technology, web isolation, cyber threats

Exposing Houdini

Posted by Greg Maudsley on Aug 22, 2017

Lately, instances of malware with built-in worm functionality have been on the rise. The WannaCry cyberattack is a perfect example. Although the malware was classified as ransomware, to increase the number of infections, the attackers used an SMB exploit to propagate it laterally within enterprises.

Read More

Tags: malware, worm, wannacry, cyber attacks, cyber threats, ransomware, Houdini, remote access trojan, isolation, web isolation

Massive Cyber Attack Threatens End Users, Again

Posted by Jay Kelley on Jun 28, 2017

Another week, another massive cyber attack hits the world. Since the Wikileaks share, powerful new hacking tools are readily available to anyone in the world. This will not be the last attack leveraging these newly available weapons.

Read More

Tags: cyber attacks, cybersecurity, cyber threats, ransomware, isolation, remote browsers, anti-phishing, security strategy, WannaCrypt, GoldenEye, bitcoin

Ransomware: Let’s End It

Posted by Greg Maudsley on Jun 22, 2017

The world could rid itself of ransomware overnight if we, as a society, could collectively agree to stop paying ransom. If there was a 100% certainty that they would not get paid, attackers would simply shift their attention elsewhere. But the fact of the matter is people do pay criminals to release their critical data. According to a new survey, 52% would pay up if their computer were taken hostage by ransomware. Why is this?

Read More

Tags: ransomware, bitcoin, bitcoins, browser-based attacks, cyber theft, cyber threats

10 Tips to Reduce Malware Threats

Posted by Kowsik Guruswamy on Mar 6, 2017



Half of the web is vulnerable to malware, as we measured recently in our State of the Web research report, making it clear that merely visiting a legitimate web site is risky.

Read More

Tags: malware, malware vulnerabilities, cybersecurity, cyber theft, cyber threats, ransomware, Google Chrome, security strategy, security, phishing, anti-phishing, bitcoins, credential theft, isolation

Connect with us

Lists by Topic

see all

Recent Posts

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.