<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1626328370711236&amp;ev=PageView&amp;noscript=1">
banner-blog.jpg

blog

10 Reasons Why You Shouldn't Consider Isolation

Posted by Jay Kelley on Dec 7, 2017

 

While this post is intended to be a little tongue-in-cheek for readers, it’s been written to provoke discussion on how organizations continue to do the same things they have done for the last 15 years, without thinking of all the issues they bring with them…

Read More

Tags: phishing, isolation, ransomware, spear-phishing, web isolation, malvertising

Lights, Camera, Cyber Attack!

Posted by Jay Kelley on Dec 5, 2017

 

The past few years, the major studios and production companies that create movies, broadcast television, streaming content, and even online and video games have been under cyber attack.

Read More

Tags: malware, isolation, ransomware, malicious code, cyber attacks, phishing attack

You Are a Bad Rabbit!

Posted by Jason Steer on Oct 26, 2017

It’s another day and another cyber attack headline in the media. This time it’s another ransomware-style attack; this one is called “Bad Rabbit”. According to media reports, it has impacted organizations in Russia and Ukraine mostly, with reports of some businesses in Turkey and Germany (and possibly in Poland and Japan) also being affected (that we know of so far).

Read More

Tags: ransomware, credential theft, cyber threats, web isolation, isolation technology, javascript, bad rabbit

Mission Impossible 17 – Spear Phishing

Posted by Jason Steer on Oct 24, 2017

Spear phishing attacks continue to plague businesses of all sizes, across all sectors. Detection of these messages remains an impossible feat. Spear phishing messages plague everyone and their intent ranges from delivering malware or ransomware, to stealing passwords and personal information, such as bank account information. All of these things have a high value in the online criminal world, hence why spear phishing is the most popular tool in the cyber attack arsenal today.

Read More

Tags: ransomware, anti-phishing, spear-phishing, cyber attacks, cyber training, cyber security

Why Financial Institutions Are Phishing’s “Big Catch”

Posted by Jay Kelley on Aug 29, 2017

The financial services industry is consistently among the most highly targeted industries for cyberattacks. Financial services institutions (FSIs) are a popular and frequent focus of attackers because, to quote famed bank robber Willie Sutton, when asked why he robbed banks: “That’s where the money’s at.”  

Read More

Tags: malware, phishing, isolation, ransomware, credential theft, drive-by exploits, phishing prevention, spear-phishing, watering hole attacks, phishing attacks, financial services industry, cyberattacks, banking credentials, keyloggers, employee credential theft

Exposing Houdini

Posted by Greg Maudsley on Aug 22, 2017

Lately, instances of malware with built-in worm functionality have been on the rise. The WannaCry cyberattack is a perfect example. Although the malware was classified as ransomware, to increase the number of infections, the attackers used an SMB exploit to propagate it laterally within enterprises.

Read More

Tags: malware, isolation, ransomware, cyber threats, cyber attacks, wannacry, web isolation, worm, Houdini, remote access trojan

Stop Phishing With Technology AND Training

Posted by Jay Kelley on Aug 17, 2017

While Black Hat USA 2017 ended three weeks ago, I wanted to share my thoughts and experiences on my very first Black Hat USA 2017 after being in security for 15+ years. 

Read More

Tags: malware, cybersecurity, isolation, ransomware, credential theft, cyber theft, black hat, cyber attacks, cyber training, authentication and application security, spearphishing, Black Hat Conference, Ichthyology, phishing training, phishing attacks

The Web Browser Risk Landscape

Posted by Jason Steer on Jul 27, 2017

Whilst working with a customer on a web isolation project over the past two weeks, I was passed on a query based on a report published by Recorded Future in December 2016. The report was a summary of what were the popular vulnerabilities used in exploit kits by attackers in 2016 (source: RecordedFuture).

Read More

Tags: ransomware, malware vulnerabilities, web-based vulnerabilities, web isolation, malvertising

Massive Cyber Attack Threatens End Users, Again

Posted by Jay Kelley on Jun 28, 2017

Another week, another massive cyber attack hits the world. Since the Wikileaks share, powerful new hacking tools are readily available to anyone in the world. This will not be the last attack leveraging these newly available weapons.

Read More

Tags: cybersecurity, isolation, ransomware, security strategy, anti-phishing, bitcoin, cyber threats, cyber attacks, remote browsers, WannaCrypt, GoldenEye

Ransomware: Let’s End It

Posted by Greg Maudsley on Jun 22, 2017

The world could rid itself of ransomware overnight if we, as a society, could collectively agree to stop paying ransom. If there was a 100% certainty that they would not get paid, attackers would simply shift their attention elsewhere. But the fact of the matter is people do pay criminals to release their critical data. According to a new survey, 52% would pay up if their computer were taken hostage by ransomware. Why is this?

Read More

Tags: ransomware, cyber theft, bitcoin, cyber threats, bitcoins, browser-based attacks

Connect with us

Lists by Topic

see all

Recent Posts