What to Look for in the New Year
I have good news and bad news. The good news is that the most difficult year in recent memory is almost over. By my count, we have less than 20 days to go, and that’s clearly not enough time for the murder hornets to make a comeback and take over the world.
Read More
Tags:
cybersecurity,
phishing,
ransomware,
anti-phishing,
business email compromise,
2021,
document attacks,
command & control,
https security,
threat landscape
The VA Has an Opportunity to Rethink Its Cybersecurity Posture in the New Normal with Cloud Web Isolation.
Covid-19 and its impact have pushed federal workers out from behind the firewall to the edge of the network in home offices. Fortunately, the Department of Veterans Affairs had already embarked on an aggressive IT modernization initiative—providing the framework for making sure remote workers have fast and consistent access to the tools and information they need, wherever the mission takes them.
Read More
Tags:
malware,
cybersecurity,
phishing,
ransomware,
web isolation,
COVID-19,
Menlo Security,
federal security,
IT modernization,
drive-by attacks,
expanding attack surface,
digital transformation,
Veterans Affairs,
VA
I’m very proud of what we do at Menlo Security. We work very hard to make sure organizations and users around the world can safely access the tools and information they need to keep businesses running. We prevent confidential data from falling into the wrong hands. We protect users’ most personal data from malicious actors. And we enable remote productivity for organizations impacted by pandemics, wildfires, and other hazards.
Read More
Tags:
phishing,
secure web gateway,
Menlo Security,
By Light,
DISA,
federal cybersecurity,
zero-days,
drive-bys
HHS Can Use Cloud Web Isolation to Stop Cybersecurity Threats without Impacting Productivity.
The U.S. Department of Health and Human Services (HHS) has been on the front lines of the Covid-19 pandemic, working with other federal departments to coordinate national policy and responses to address the public health crisis. However, just as in enterprises around the world, HHS has had to deal with shelter-in-place orders and work-from-home policies that have scattered users out from behind the data security perimeter to home offices. The ability of employees to log in to critical systems in the middle of a global pandemic is mission critical and a national security priority, but the department’s systems and the data that powers them need to continue to be secured without impacting business continuity or the native user experience.
Read More
Tags:
cybersecurity,
phishing,
web isolation,
secure web gateway,
NIST,
Data Privacy,
Health IT,
HHS,
Office for Civil Rights
Discover How You Can Protect Users and the Organization in Today’s New Normal
The past six months have been a whirlwind of change. Security teams across the world have scrambled to empower distributed users with the tools and information they need to keep businesses running. Now everyone is accessing everything from everywhere, with limited control and visibility into who is accessing what, where, and on what device.
Read More
Tags:
cybersecurity,
phishing,
spearphishing,
cyberattacks,
Web Security,
HTTPS,
SaaS,
cloud security,
VPN,
email security,
new normal,
cloud apps,
BYOD
Menlo Security’s iSOC—our isolation-powered SOC service—identified a credential phishing campaign targeting the hospitality industry. Menlo Labs researchers decided to take a deeper dive into the campaign and I’m glad we did, because it sure turned out to be an interesting one.
Read More
Tags:
phishing,
isolation,
captcha
Targeting People, Not the Infrastructure
Historically, many cyberattacks tended to be technology-focused and required specialized knowledge to expertly fool a network into believing the attacker was an authorized user. Spoofing, man-in-the-middle (LAN or Wi-Fi), DNS, and other attacks require actual skill (and a bit of malice) to properly execute.
Read More
Tags:
phishing,
isolation,
email isolation,
link isolation,
link wrapping
Isolation for Zero Trust Phishing Protection
Phishing sites frequently evade web and email filters because of the inability of secure gateways to detect new phishing websites or categorize them properly. According to Menlo Labs, web and email gateways wrongly categorize 10-15 percent of malicious websites as safe.
Read More
Tags:
phishing,
isolation,
URL,
email filtering,
zero trust
Large Groups of Isolated Users Shrink Your Exposure Surface
Enterprises frequently acquire an isolation solution (with Menlo for remote browser isolation) for groups of users, such as VIPs, rather than their entire workforce. While this strategy insulates VIPs from malware attacks, it assumes that only VIPs have access to potentially crippling information.
Read More
Tags:
phishing,
isolation,
Incident Response,
API,
logging
Inadequate Security Policies with Uncategorized Sites
The challenge most email gateways face is how to protect against URL-based threats that exist within a “danger zone”— the period when phishing sites are allowed to sneak into the network as uncategorized sites.
Read More
Tags:
phishing,
email isolation,
uncategorized sites,
URL,
email filtering,
danger