banner-blog.jpg

blog

Menlo Security Stands behind Its security—Announces $1 Million Malware Protection Warranty

Posted by Mehul Patel on Feb 26, 2020

Today we announced security without compromise. Menlo Security is offering a warranty of up to $1 million to any customer that experiences an infection from malware that passes through our Isolation Core™. This warranty is the first of its kind from a cloud proxy company, a category that includes some very large, public companies who have thousands of customers. 

Read More

Tags: Web Security, Isolation Core, Cloud Proxy, Anti-Malware

Emotet attacks— a spike to start the year...

The Emotet malware is a very destructive banking Trojan that was first identified in 2014. Over the years it has evolved with new capabilities and functionalities, prompting cybersecurity agencies like the Australian Cyber Security Centre and US-CERT to issue advisories. Emotet malware generally spreads via malicious documents that drop a modular Trojan bot, which is used to download and install additional remote access tools. We wrote a blog post in January 2019 about how the malware had changed tactics, leading to a spike in the number of Emotet malware attacks. In the last week, we have observed a spike in the number of Emotet malware transactions across our customer base. US-CERT has also issued a fresh advisory regarding the recent spate of attacks. 

Read More

Tags: Web Security, CVE, emotet

IE and FIREFOX-Patching nightmare begins in 2020...

Posted by Vinay Pidathala on Jan 27, 2020

Not all vulnerabilities are created equal. It’s true. In a perfect world, organizations should be able to patch every vulnerability on every client immediately. But we don’t live in a perfect world. Some vulnerabilities pose a much greater risk to the organization than others and should be prioritized.

Read More

Tags: Web Security, ZeroTrust, Internet Isolation, CVE

Menlo Security Protects Organizations from Iranian Retaliation

Posted by Young-Sae Song on Jan 24, 2020

As warfare extends to cyberspace, U.S.-based organizations can use email and web isolation to protect users from common tactics used by Iranian-backed threat actors.

Read More

Tags: phishing prevention, Web Security, ZeroTrust Internet, CBII

Browsers Protected by Menlo Security will now Prioritize the Active Browser Window and Deprioritize the Inactive Ones

Posted by James Locus on Dec 3, 2019

As any office worker knows, browser tabs have a way of multiplying during the work day. Sure - it begins innocently enough flipping back between two news articles. 

 

However, after a while, the tabs will have increased six-fold as the user inevitably gets distracted between YouTube, Spotify, and Salesforce. When done on a large scale, all those inactive tabs can eat up valuable network resources. 

Read More

Tags: Web Security, Secure Web Access, Bandwidth

Evaluating Internet Isolation Clouds: Must-Have Features

Posted by Mehul Patel on Nov 20, 2019

Not all Internet isolation solutions are created equal. Just ask our customers. One of them learned the hard way.

Read More

Tags: Web Security, ZeroTrust, ZeroTrust Internet, Guide,, Internet Isolation

Isolation protects you from threats that haven’t even been discovered

Posted by Mehul Patel on Nov 8, 2019

Another day, another validation that Internet isolation really is the best cybersecurity protection out there.

Last week, Google released an urgent Chrome update to patch an actively exploited zero-day known as CVE-2019-13720, a memory corruption bug that uses a use-after-free vulnerability in audio that allows a threat actor to access memory after it has been freed. This allows anyone to cause a program to crash, execute arbitrary code, or even enable full remote code execution scenarios. Pretty serious stuff that should worry even the most secure enterprises.

Read More

Tags: Web Security, ZeroTrust, Internet Isolation, CVE

Preparing for the New Regulatory Environment

Posted by Mehul Patel on Nov 6, 2019

It started as a phishing expedition and ended up being the largest data breach in the history of Singapore. It was June 2018. The FIFA World Cup was in full swing, Jurassic World hit theaters worldwide, and a low-level administrator with SingHealth, the country’s largest healthcare network, clicked on a seemingly innocent link in an email.

Read More

Tags: browser isolation, Web Security, ZeroTrust, ZeroTrust Internet, Guide,, Internet Isolation

Hiding in Plain Sight: New Adwind jRAT Variant Uses Normal Java Commands to Mask its Behavior

Street magicians have a secret: If you want to hide something, hide it in plain sight. It’s how hidden card tricks, sleight of hand and most illusions work. Unfortunately, malicious actors are learning how to use the same concept to sneak malware past traditional cybersecurity tools and onto users’ computers. And, it’s causing havoc on two fronts: enterprise security and user productivity.

Read More

Tags: Web Security, Internet Isolation, RAT

Internet Isolation: Exploring Use Cases

Posted by Mehul Patel on Oct 23, 2019

You understand the technology and how it is engineered. Now let’s talk about how Internet isolation works in the real world. Once implemented, how does it protect users from specific cyberthreats that are common in today’s always-on, 24/7 world?

Read More

Tags: Web Security, ZeroTrust, ZeroTrust Internet, Guide,, Internet Isolation

Connect with us

Lists by Topic

see all

Recent Posts