The VA Has an Opportunity to Rethink Its Cybersecurity Posture in the New Normal with Cloud Web Isolation.
Covid-19 and its impact have pushed federal workers out from behind the firewall to the edge of the network in home offices. Fortunately, the Department of Veterans Affairs had already embarked on an aggressive IT modernization initiative—providing the framework for making sure remote workers have fast and consistent access to the tools and information they need, wherever the mission takes them.
Read More
Tags:
malware,
cybersecurity,
phishing,
ransomware,
web isolation,
COVID-19,
Menlo Security,
federal security,
IT modernization,
drive-by attacks,
expanding attack surface,
digital transformation,
Veterans Affairs,
VA
The Still-Active Zero-Day Exploit Threatens the Frequently Vulnerable JavaScript Engine
Customers of Menlo Security using Internet Explorer (IE) are protected against a recent and still-active zero-day exploit using Internet Explorer, as outlined by Microsoft’s security update CVE-2020-1380.
Read More
Tags:
malware,
isolaton,
Internet Isolation,
Active-Threat,
CVE-2020-1380,
Zero-Day Attack,
Internet Explorer,
IE
How a Fortune 500 Customer Embraced Menlo’s Isolation as Their Primary Defense Against Phishing and Email Threats.
I had the opportunity to chat with one of our largest customers the other day. I can’t mention the company name, but they are a big, well-known brand. Menlo works with eight of the ten largest banks and four of the five biggest credit card companies in the world. Let’s just say it was one of them.
Read More
Tags:
malware,
cybersecurity,
phishing,
isolation,
secure web gateway,
financial services security,
email security,
global cloud proxy
Secure Remote Worker Use Case 3:
URL Filtering, SaaS Access Control, and Visibility
A cloud-based secure web gateway (SWG) gives cybersecurity teams complete visibility and control over traffic that bypasses the VPN. Consider these two use cases.
Read More
Tags:
malware,
phishing,
security,
spear-phishing,
DLP,
cloud-delivered security,
visibility and control,
URL filtering,
VPN,
SaaS access,
remote users,
acceptable use policies
Now, more than ever, the world is changing faster than people and companies can react. Organizations need help with keeping up to date on the cyberthreats to watch for, how attackers attempt to infiltrate the endpoint, and how to stop attacks in their tracks. Otherwise, cybersecurity is largely a patchwork of guesses, what-if scenarios, and crossed fingers.
Read More
Tags:
malware,
phishing,
remote browser isolation,
RB,
active content security,
ASD,
essential eight, phishing,
application patching,
operating systems patching,
macro security
Regardless of the political fall-out from Special Counsel Robert J. Mueller’s indictment of twelve Russian intelligence operatives for tampering with the 2016 U.S. Presidential election, this much seems clear after reading the 29-page, John LeCarre-like document: It has become unreasonable to expect any organization to successfully defend against such a massive, coordinated cyberattack.
Read More
Tags:
malware,
phishing,
isolation,
credential theft,
spear-phishing,
remote browsing,
cyberattacks,
browser isolation,
presidential election,
Russian hackers,
Russian operatives,
Russian intelligence,
DNC,
DCCC,
Podesta,
cryptojacking,
X-Agent,
Mueller,
U.S. election,
GRU,
Clinton Campaign,
Democratic National Committee,
Democratic Congressional Campaign Committee,
Clinton,
cryptocurrency
Compromised Websites and Download Bomb Attacks
In recent weeks a resurgence of download bomb attacks has been observed in the wild, attempting to add legitimacy to malicious websites serving a tech support based phishing scam. For users of Menlo Security’s Isolation Platform (MSIP), this attack is trivially defeated with zero malicious content reaching the end user’s device. However, the same may not be said for reputation based security, as we review below.
Read More
Tags:
malware,
phishing,
isolation,
javascript,
compromised websites,
download bomb
“Love is like a virus. It can happen to anybody at any time.” – Maya Angelou
It’s Valentine’s Day, and love is in the air.
Unfortunately, so are emails riddled with malware.
Read More
Tags:
malware,
cyber security,
isolation technology,
isolation platform,
virus
The past few years, the major studios and production companies that create movies, broadcast television, streaming content, and even online and video games have been under cyber attack.
Read More
Tags:
malware,
isolation,
ransomware,
malicious code,
cyber attacks,
phishing attack
The holiday shopping season kicks off this week with Black Friday (November 24
th) and Cyber Monday (November 27
th). And, if it’s any indication of how much online shopping will occur, last year (2016), Cyber Monday set a new sales record of $3.45 billion USD!
Read More
Tags:
malware,
phishing,
isolation,
cyber attacks,
isolation platform,
cyber Monday,
Black Friday