<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1626328370711236&amp;ev=PageView&amp;noscript=1">
banner-blog.jpg

blog

Why Financial Institutions Are Phishing’s “Big Catch”

Posted by Jay Kelley on Aug 29, 2017

The financial services industry is consistently among the most highly targeted industries for cyberattacks. Financial services institutions (FSIs) are a popular and frequent focus of attackers because, to quote famed bank robber Willie Sutton, when asked why he robbed banks: “That’s where the money’s at.”  

Read More

Tags: financial services industry, cyberattacks, phishing, phishing attacks, phishing prevention, malware, ransomware, isolation, banking credentials, keyloggers, employee credential theft, credential theft, watering hole attacks, drive-by exploits, spear-phishing

Is Your Web Viewing Dangerous? Over 350k Web Sites Run Vulnerable Software

Posted by Peter Lunk on May 25, 2017

Over 350,000 of the world’s top 1 million web sites may be running vulnerable software --  which the recent WannaCry cyber attack has shown can spell considerable risk of hacker exploitation. According to the Menlo Security State of The Web report, software on some web sites dates back to over a decade ago, as far back as the year 2000. The cyber security research reveals that nearly half (46%) of the Internet’s top 1 million web sites, as ranked by Alexa, are risky, and that 1 in 5 domains run vulnerable software.

Read More

Tags: wannacry, cyber attacks, malware vulnerabilities, ransomware, credential theft, hackers, financial security firms, banks, credit unions, isolation, web threats, email threats, spear-phishing, phishing prevention

It Ain’t Over Til It’s Over

Posted by Jay Kelley on May 14, 2017

A picture of a London newsstand on Saturday, May 13, 2017, the day after the WannaCry ransomware cyberattack struck. (Picture by Jason Steer, Menlo Security, Inc.)

Read More

Tags: ransomware, Wana Decryptor, WCry, phishing scams, anti-phishing, phishing prevention, spear-phishing, ETERNALBLUE, Windows security update, MS17-010

WCry Ransomware: The End of the World as We Know It?

Posted by Jay Kelley on May 13, 2017

The day started out as normally as any Friday in May around the world could. 

Read More

Tags: ransomware, Wana Decryptor, WCry, phishing scams, anti-phishing, phishing prevention, spear-phishing, ETERNALBLUE, Windows security update, MS17-010

Ransomware in Healthcare…Still?

Posted by Greg Maudsley on May 5, 2017

By now, after years of ransomware in the news, one would think that the problem would begin to ebb, given nearly every security vendors’ claims to prevent it. Obviously this has not proven true, particularly in healthcare.

Read More

Tags: healthcare, phishing prevention, anti-phishing, ransomware, malware, isolation

Increasingly Clever Phishing Attacks like OAuth Are The New Normal

Posted by Greg Maudsley on May 4, 2017

In the past, an attacker looking to steal credentials would craft a convincing email and landing page that did not trigger any red flags to the user. Attackers could be certain that at least 11% of people, even those who’d had phishing awareness training, would click malicious email links. Looking to up this percentage, attackers have evolved phishing exploits to use novel techniques, and OAuth is an important part of this evolution. This new approach is making it more challenging than ever for users to know when it is safe to click.

Read More

Tags: phishing, phishing prevention, phishing scams, Google Docs email scam, Eugene Pupov, isolation

Detecting the Undetectable - The Punycode Homograph Attack

Posted by Jason Steer on Apr 25, 2017

Another week, another web security story where organisations need to consider how to defend against another phishing attack. 

Read More

Tags: punycode, anti-phishing, phishing prevention, remote browsing, isolation, state of the web, browser-based attacks, cyber attacks, cybersecurity

RSA 2017 is a Wrap – Were Credential Theft and Phishing on Your Radar?

Posted by Greg Maudsley on Mar 2, 2017

There were many hot topics and cybersecurity themes at this year’s RSA Conference in San Francisco, from ransomware, to Sec Ops, to post breach mitigation.

Read More

Tags: credential theft, isolaton, Adaptive Clientless Rendering, cybersecurity, phishing, phishing prevention

10 Reasons Why You Shouldn’t Consider Isolation!

Posted by Jason Steer on Nov 29, 2016

This is intended to be a little tongue in cheek for readers, however it’s been written to provoke discussion on how organizations continue to do the same things they have done for the last 15 years without thinking. 

Read More

Tags: anti-phishing, phishing prevention, malicious code, malware, isolation, cybersecurity, security, security strategy, ransomware, spear-phishing

Protecting Asian Business from Cyberattack – Isolate Risky Content

Posted by Stephanie Boo on Nov 10, 2016

Across the Asia Pacific, cyber security communities are sharing information about malicious actor techniques from other regions, in hopes of avoiding copycat attacks. In one case, data theft from a US government agency exploit was foiled when individual users repeatedly asked IT to have their malware-ridden laptops re-imaged. It turns out, it wasn’t just malware that was the security issue – the malware was a cover up for a sophisticated ring of insider data-stealing activities. Each time the externally-based ring leader thought their data stealing attempts might be discovered, the malware was inflicted on internal users to force a reimage and cover their tracks.

Read More

Tags: cybersecurity, malware, malware vulnerabilities, Australian Information Security Association, security, isolation, phishing prevention

Connect with us

Lists by Topic

see all

Recent Posts

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.