<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1626328370711236&amp;ev=PageView&amp;noscript=1">
banner-blog.jpg

blog

Menlo Security Rings in 2017 with Channel Partner Program

Posted by Doug Schultz on Jan 30, 2017
Read More

Tags: malware, cybersecurity, phishing, threats, security strategy, channel partner

Malware & Credential Theft are the Problems, not Russia

Posted by Greg Maudsley on Jan 19, 2017

 

Read More

Tags: malware, cybersecurity, phishing, isolation, credential theft, gartner, anti-phishing

Browsing the Web is a Leap into the Unknown

Posted by Kowsik Guruswamy on Dec 13, 2016

Users must recognize that they are taking a significant risk when connecting directly to the Internet. The new Menlo Security State of The Web report reveals that nearly half (46%) of the Internet’s top 1 million web sites, as ranked by Alexa, are risky.  

Read More

Tags: malware, cybersecurity, blog, isolation, malware vulnerabilities, cyber theft, security strategy, anti-phishing, state of the web

Yes Muni, You Can Limit Ransomware Attacks

Posted by Peter Lunk on Dec 1, 2016

The San Francisco Bay Area was enjoying a US Thanksgiving holiday weekend when ransomware hit its municipal transportation agency, locally known as Muni. Over 900 office computers were affected, with Muni data locked up as the hacker demanded 100 bitcoins, or roughly $73,000, which the San Francisco Municipal Transportation Agency (SFMTA) never considered paying, according to the San Jose Mercury News.

Read More

Tags: malware, cybersecurity, isolation, ransomware, cyber theft, anti-phishing, San Francisco, bitcoin, Muni, remote browsing

10 Reasons Why You Shouldn’t Consider Isolation!

Posted by Jason Steer on Nov 29, 2016

This is intended to be a little tongue in cheek for readers, however it’s been written to provoke discussion on how organizations continue to do the same things they have done for the last 15 years without thinking. 

Read More

Tags: malware, cybersecurity, isolation, security, ransomware, malicious code, security strategy, anti-phishing, phishing prevention, spear-phishing

Protecting Asian Business from Cyberattack – Isolate Risky Content

Posted by Stephanie Boo on Nov 10, 2016

Across the Asia Pacific, cyber security communities are sharing information about malicious actor techniques from other regions, in hopes of avoiding copycat attacks. In one case, data theft from a US government agency exploit was foiled when individual users repeatedly asked IT to have their malware-ridden laptops re-imaged. It turns out, it wasn’t just malware that was the security issue – the malware was a cover up for a sophisticated ring of insider data-stealing activities. Each time the externally-based ring leader thought their data stealing attempts might be discovered, the malware was inflicted on internal users to force a reimage and cover their tracks.

Read More

Tags: malware, cybersecurity, isolation, security, malware vulnerabilities, phishing prevention, Australian Information Security Association

The Patient Zero Myth

Posted by Greg Maudsley on Oct 26, 2016

In medical terms, Patient Zero is loosely defined as the first human infected by a new or recently discovered viral or bacterial outbreak. The term has found its way into the IT security lexicon where its corollary is the first individual to be infected by a new malware strain, or the first victim in a phishing campaign.

Read More

Tags: malware, cybersecurity, blog, phishing, isolation, security, malicious code, anti-phishing, phishing prevention

Mass Downloads of Documents Still Include Malware

Posted by Greg Cross on Oct 14, 2016

A new and rapid growth trend during the U.S. political season is that various treasure troves of leaked documents now await  the masses on the Internet, including via sites like WikiLeaks and "Guccifer 2.0’s” latest Wordpress blog. 

Read More

Tags: malware, cybersecurity, phishing, isolation, pdf, security, ransomware, risk, malicious code, malware vulnerabilities, cyber theft, security strategy, email attachments

Reducing Risk by Eliminating the Phish

Posted by Greg Maudsley on Oct 4, 2016

 Recently, I’ve been speaking with a lot of CISOs, security industry veterans, and analysts about risk.

Read More

Tags: malware, cybersecurity, phishing, threats, isolation, security, ransomware, credential theft, drive-by exploits

Black Hat 2016: An Overload of Senses from Culinary Excess to a Tsunami of Cyber Events

Posted by Lennart van den Ende on Aug 16, 2016

Las Vegas has a tendency to overload all of your senses. Similarly Black Hat, too, has the effect of inducing information overload on nearly every participant.

Read More

Tags: malware, cybersecurity, phishing, sandbox, trends, threats, isolation, security, black hat

Connect with us

Lists by Topic

see all

Recent Posts