banner-blog.jpg

BLOG

Stop Phishing With Technology AND Training

Posted by Jay Kelley on Aug 17, 2017

While Black Hat USA 2017 ended three weeks ago, I wanted to share my thoughts and experiences on my very first Black Hat USA 2017 after being in security for 15+ years. 

Read More

Tags: malware, cybersecurity, isolation, ransomware, credential theft, cyber theft, black hat, cyber attacks, cyber training, authentication and application security, spearphishing, Black Hat Conference, Ichthyology, phishing training, phishing attacks

The Web Browser Risk Landscape

Posted by Jason Steer on Jul 27, 2017

Whilst working with a customer on a web isolation project over the past two weeks, I was passed on a query based on a report published by Recorded Future in December 2016. The report was a summary of what were the popular vulnerabilities used in exploit kits by attackers in 2016 (source: RecordedFuture).

Read More

Tags: ransomware, malware vulnerabilities, web-based vulnerabilities, web isolation, malvertising

Massive Cyber Attack Threatens End Users, Again

Posted by Jay Kelley on Jun 28, 2017

Another week, another massive cyber attack hits the world. Since the Wikileaks share, powerful new hacking tools are readily available to anyone in the world. This will not be the last attack leveraging these newly available weapons.

Read More

Tags: cybersecurity, isolation, ransomware, security strategy, anti-phishing, bitcoin, cyber threats, cyber attacks, remote browsers, WannaCrypt, GoldenEye

Ransomware: Let’s End It

Posted by Greg Maudsley on Jun 22, 2017

The world could rid itself of ransomware overnight if we, as a society, could collectively agree to stop paying ransom. If there was a 100% certainty that they would not get paid, attackers would simply shift their attention elsewhere. But the fact of the matter is people do pay criminals to release their critical data. According to a new survey, 52% would pay up if their computer were taken hostage by ransomware. Why is this?

Read More

Tags: ransomware, cyber theft, bitcoin, cyber threats, bitcoins, browser-based attacks

Is Your Web Viewing Dangerous? Over 350k Web Sites Run Vulnerable Software

Posted by Peter Lunk on May 25, 2017

Over 350,000 of the world’s top 1 million web sites may be running vulnerable software --  which the recent WannaCry cyber attack has shown can spell considerable risk of hacker exploitation. According to the Menlo Security State of The Web report, software on some web sites dates back to over a decade ago, as far back as the year 2000. The cyber security research reveals that nearly half (46%) of the Internet’s top 1 million web sites, as ranked by Alexa, are risky, and that 1 in 5 domains run vulnerable software.

Read More

Tags: isolation, ransomware, credential theft, malware vulnerabilities, phishing prevention, spear-phishing, banks, cyber attacks, wannacry, hackers, financial security firms, credit unions, web threats, email threats

Phishing & Whaling at FS-ISAC

Posted by Jay Kelley on May 22, 2017

Exhibiting at the recent FS-ISAC Annual Summit 2017 at the Dolphin Convention Center (which could have doubled as a meat locker at times because it was so cold, while other times it could have been a large sauna it was so hot and steamy!), there was a mini-monsoon outside at one point. It was like Mother Nature was mimicking the downpour of cyber attacks confronting the financial services players at the event. It was a deluge! 

Read More

Tags: malware, cybersecurity, isolation, ransomware, credential theft, financial services, drive-by exploits, spear-phishing, cyber attacks, FS-ISAC Annual Summit 2017

The (Human) Face of Ransomware

Posted by Jay Kelley on May 19, 2017

When you start to realize the scope and impact the ransomware attack that began on Friday, May 12, 2017, and continued to roll onward into last weekend had not only a huge negative effect on businesses and their operations, but on everyday people, it begins to become all too real.

Read More

Tags: phishing, isolation, ransomware, drive-by exploits, spear-phishing, cyber attacks, Telefonica, Vodafone, Gas Natural, watering hole attacks, wannacry

WCry: Reviewing the Info (So Far)

Posted by Jason Steer on May 18, 2017
Read More

Tags: isolation, ransomware, WCry, North Korea

It Ain’t Over Til It’s Over

Posted by Jay Kelley on May 14, 2017

A picture of a London newsstand on Saturday, May 13, 2017, the day after the WannaCry ransomware cyberattack struck. (Picture by Jason Steer, Menlo Security, Inc.)

Read More

Tags: ransomware, anti-phishing, phishing prevention, spear-phishing, phishing scams, Wana Decryptor, WCry, ETERNALBLUE, Windows security update, MS17-010

WCry Ransomware: The End of the World as We Know It?

Posted by Jay Kelley on May 13, 2017

The day started out as normally as any Friday in May around the world could. 

Read More

Tags: ransomware, anti-phishing, phishing prevention, spear-phishing, phishing scams, Wana Decryptor, WCry, ETERNALBLUE, Windows security update, MS17-010

Connect with us

Lists by Topic

see all

Recent Posts