<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1626328370711236&amp;ev=PageView&amp;noscript=1">
banner-blog.jpg

blog

The (Human) Face of Ransomware

Posted by Jay Kelley on May 19, 2017

When you start to realize the scope and impact the ransomware attack that began on Friday, May 12, 2017, and continued to roll onward into last weekend had not only a huge negative effect on businesses and their operations, but on everyday people, it begins to become all too real.

Read More

Tags: phishing, isolation, ransomware, drive-by exploits, spear-phishing, cyber attacks, Telefonica, Vodafone, Gas Natural, watering hole attacks, wannacry

It Ain’t Over Til It’s Over

Posted by Jay Kelley on May 14, 2017

A picture of a London newsstand on Saturday, May 13, 2017, the day after the WannaCry ransomware cyberattack struck. (Picture by Jason Steer, Menlo Security, Inc.)

Read More

Tags: ransomware, anti-phishing, phishing prevention, spear-phishing, phishing scams, Wana Decryptor, WCry, ETERNALBLUE, Windows security update, MS17-010

WCry Ransomware: The End of the World as We Know It?

Posted by Jay Kelley on May 13, 2017

The day started out as normally as any Friday in May around the world could. 

Read More

Tags: ransomware, anti-phishing, phishing prevention, spear-phishing, phishing scams, Wana Decryptor, WCry, ETERNALBLUE, Windows security update, MS17-010

Don’t Let Phishing Ruin Your Trip

Posted by Jay Kelley on May 10, 2017

Traveling on business, you check into a business-friendly hotel for a few days. You approach the front desk of the hotel, checking in after a long flight. But, the front desk staff is, unfortunately, unable to check you in because the hotel’s electronic key system has been hacked. Someone on the hotel’s staff opened an email from an unknown party, clicked on an unknown link, and malware has infected the electronic key system. So, until ransom is paid, keys cannot be issued. Would you ever stay at that hotel again? Probably not. 

Read More

Tags: isolation, ransomware, anti-phishing, spear-phishing, hospitality, hacked, read-only mode

Isolate the Unstoppable - Spear-Phish

Posted by Jason Steer on Mar 31, 2017
Read More

Tags: isolation, risk, credential theft, anti-phishing, spear-phishing, phishers, patient zero, spammers, anti-spam, browser-based attacks

State of Cyber Security in the Middle East

Posted by Jason Steer on Mar 24, 2017

dubai.png

I just spent a week in several new geographical markets for Menlo Security, the United Arab Emirates and Qatar, meeting and talking to new and existing customers. Online risks are no different in the Middle East than they are in the USA, Asia or Europe. The risks may have different names, but the impact remains the same.

Read More

Tags: isolation, credential theft, malware vulnerabilities, spear-phishing, Qatar, United Arab Emirates, Shamoon attack, cyber attacks

Going Phishing During Tax Season

Posted by Jay Kelley on Mar 15, 2017

 

You’ve probably heard about businesses that have fallen victim to successful spear-phishing attacks leading to the theft of employee W-2s. But, the IRS began warning tax professionals in January they are under attack, too!

Read More

Tags: phishing, security, credential theft, financial services, spear-phishing

10 Reasons Why You Shouldn’t Consider Isolation!

Posted by Jason Steer on Nov 29, 2016

This is intended to be a little tongue in cheek for readers, however it’s been written to provoke discussion on how organizations continue to do the same things they have done for the last 15 years without thinking. 

Read More

Tags: malware, cybersecurity, isolation, security, ransomware, malicious code, security strategy, anti-phishing, phishing prevention, spear-phishing

Connect with us

Lists by Topic

see all

Recent Posts