banner-blog.jpg

MENLO SECURITY BLOG

Articles, trends, and advice on cloud security without compromise. Keep up with the latest blog insights on web isolation, network cybersecurity, malware, and more.

Ransomware: Looking beyond endpoint protection

Posted by Marcos Colón on Apr 13, 2021

The last year has been one of the most active in the previous decade in cybersecurity. More than 1,000 data breaches took place in the United States alone, with a total of 155 million individuals impacted by data exposures, according to Statista. But when it comes to ransomware, the data on this insidious type of cyberattack is even more alarming.

 

Read More

Tags: malware, phishing, Isolation Core

Protecting Mobile Users from Malware Threats with an Industry-First Secure Web Gateway (SWG) Powered by Isolation

Posted by Nick Edwards on Mar 10, 2021

Mobile devices and browsers are an enticing target for cyber attackers looking to exploit zero days and conduct socially engineered phishing attacks, yet in many organizations, mobile security is treated like a second-class citizen. Today we announced an industry first by extending our cloud based SWG to include web isolation for mobile devices. This new offering is designed to eliminate the threat of malware and phishing attacks when users are accessing the internet and email from their smartphones and tablets.

Read More

Tags: phishing, secure web gateways, SWG, Mobile Web Browser, Malicious Document Download, Cloud, Malware, Mobile Isolation, Browser Vulnerabilities, Mobile Devices

2021 Cybersecurity Threat Landscape

Posted by Kowsik Guruswamy on Dec 16, 2020

What to Look for in the New Year

I have good news and bad news. The good news is that the most difficult year in recent memory is almost over. By my count, we have less than 20 days to go, and that’s clearly not enough time for the murder hornets to make a comeback and take over the world.

Read More

Tags: cybersecurity, phishing, ransomware, anti-phishing, business email compromise, 2021, document attacks, command & control, https security, threat landscape

Honorably Serving Our Veterans Wherever the Mission Goes

Posted by Mehul Patel on Nov 2, 2020

The VA Has an Opportunity to Rethink Its Cybersecurity Posture in the New Normal with Cloud Web Isolation.

Covid-19 and its impact have pushed federal workers out from behind the firewall to the edge of the network in home offices. Fortunately, the Department of Veterans Affairs had already embarked on an aggressive IT modernization initiative—providing the framework for making sure remote workers have fast and consistent access to the tools and information they need, wherever the mission takes them.

Read More

Tags: malware, cybersecurity, phishing, ransomware, web isolation, COVID-19, Menlo Security, federal security, IT modernization, drive-by attacks, expanding attack surface, digital transformation, Veterans Affairs, VA

Update on DoD’s Cloud-Based Internet Isolation

Posted by Kowsik Guruswamy on Oct 28, 2020

I’m very proud of what we do at Menlo Security. We work very hard to make sure organizations and users around the world can safely access the tools and information they need to keep businesses running. We prevent confidential data from falling into the wrong hands. We protect users’ most personal data from malicious actors. And we enable remote productivity for organizations impacted by pandemics, wildfires, and other hazards.

Read More

Tags: phishing, secure web gateway, Menlo Security, By Light, DISA, federal cybersecurity, zero-days, drive-bys

Safeguarding Our Health Information in a Global Pandemic

Posted by Mehul Patel on Oct 20, 2020

HHS Can Use Cloud Web Isolation to Stop Cybersecurity Threats without Impacting Productivity.

The U.S. Department of Health and Human Services (HHS) has been on the front lines of the Covid-19 pandemic, working with other federal departments to coordinate national policy and responses to address the public health crisis. However, just as in enterprises around the world, HHS has had to deal with shelter-in-place orders and work-from-home policies that have scattered users out from behind the data security perimeter to home offices. The ability of employees to log in to critical systems in the middle of a global pandemic is mission critical and a national security priority, but the department’s systems and the data that powers them need to continue to be secured without impacting business continuity or the native user experience.

Read More

Tags: cybersecurity, phishing, web isolation, secure web gateway, NIST, Data Privacy, Health IT, HHS, Office for Civil Rights

Five Cloud Security Considerations for CISOs

Posted by Kowsik Guruswamy on Oct 8, 2020

Discover How You Can Protect Users and the Organization in Today’s New Normal

The past six months have been a whirlwind of change. Security teams across the world have scrambled to empower distributed users with the tools and information they need to keep businesses running. Now everyone is accessing everything from everywhere, with limited control and visibility into who is accessing what, where, and on what device.

Read More

Tags: cybersecurity, phishing, spearphishing, cyberattacks, Web Security, HTTPS, SaaS, cloud security, VPN, email security, new normal, cloud apps, BYOD

Menlo Threat Labs Uncovers a Phishing Attack Using Captchas

Posted by Vinay Pidathala on Sep 30, 2020

Menlo Security’s iSOC—our isolation-powered SOC service—identified a credential phishing campaign targeting the hospitality industry. Menlo Labs researchers decided to take a deeper dive into the campaign and I’m glad we did, because it sure turned out to be an interesting one.

 

Read More

Tags: phishing, isolation, captcha

Phishing Attacks Are Scarily Easy to Build

Posted by James Locus on Sep 22, 2020

Targeting People, Not the Infrastructure

Historically, many cyberattacks tended to be technology-focused and required specialized knowledge to expertly fool a network into believing the attacker was an authorized user. Spoofing, man-in-the-middle (LAN or Wi-Fi), DNS, and other attacks require actual skill (and a bit of malice) to properly execute.

Read More

Tags: phishing, isolation, email isolation, link isolation, link wrapping

How Should Zero Trust Apply to Phishing?

Posted by James Locus on Sep 3, 2020

Isolation for Zero Trust Phishing Protection

Phishing sites frequently evade web and email filters because of the inability of secure gateways to detect new phishing websites or categorize them properly. According to Menlo Labs, web and email gateways wrongly categorize 10-15 percent of malicious websites as safe.

Read More

Tags: phishing, isolation, URL, email filtering, zero trust

Connect with us

Lists by Topic

see all

Recent Posts