<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1626328370711236&amp;ev=PageView&amp;noscript=1">
banner-blog.jpg

blog

Where Detection and Prevention Fail, Isolation Succeeds

Posted by Mehul Patel on Apr 30, 2019
As customers adopt a cloud-first approach to IT by allowing users to access the latest SaaS applications, customers are also looking to move their security services to the cloud. However, under-resourced security teams are in a constant position of having to put out fires. This is evidenced by the sheer number of devastating data breaches that make headlines every week.

According to Gartner, the accelerating adoption of cloud applications and an ever-mobile workforce have made the browser the most important productivity tool on an endpoint by far. At the same time, the vast majority of cyberattacks start with browser, targeting end-users with bogus emails and infected attachments, websites and downloadable documents.

We cannot expect legacy Web Security approaches like Secure Web Gateway, URL Filtering or Sandbox solutions to detect and prevent every threat. Even the most aptly trained professional can fall prey to a seemingly normal website or email. Instead, enterprises need to look to a strategy that isolates employees devices. Rather than detect threats and block employees from accessing dangerous web content, this approach simply isolates their laptops from all browser-based traffic.

How does this work exactly? Take a large, global insurance company as an example. They were experiencing web malware and phishing attacks and found that 80 percent of those issues were caused by employees accessing uncategorized websites. Infected devices required costly, time-consuming reimaging. While anti-phishing training for employees was somewhat helpful in addressing the attacks, many employees continued to click on infected links, leading to credential theft and malware infection. By leveraging isolation, everything employees do with a browser is executed in the cloud remote browser instead of the devices themselves. Whether surfing the web, reading emails or downloading documents, it is impossible for malware to be introduced to the network to which the device is connected. What’s more, end-users cannot see their web sessions are actually occurring on our platform rather than on their PCs. The experience is the same.

Menlo Security has done just that - created a transformative security access platform for web applications and websites, available as a service in the cloud or on-premise. This revolutionary platform is scalable, manageable, and easy for corporate customers to adopt. To learn more visit: https://www.menlosecurity.com/isolation-platform
Read More

Tags: patient zero, browser isolation, malicious attachment, Web Security

Only 4 percent of users click on phishing emails. Yet those 4 percent never learn..

Posted by Mehul Patel on Apr 16, 2019

Working as a cybersecurity warrior has its perks. We’re on the front lines of an increasingly critical and dynamic battlefield, pitting increasingly sophisticated threats against increasingly sophisticated defenses. We’re doing important work, and it can be very rewarding.

Read More

Tags: email attachments, phishing training, phishing, malware, cyber attack, malicious links

Gartner Report on Remote Browser Isolation: A Year Later

Posted by Menlo Security on Apr 16, 2019

It’s been a year since Gartner released its report on remote browser isolation. At the time, the report was forward thinking—controversial even—as it suggested that enterprises can no longer assume that their traditional detect-and-respond security strategy is enough to stop all web-based malware attacks. Analyst Neil MacDonald argued that enterprises should stop trying to detect every attack and instead focus on “containing the ability of the attacker to cause damage and reduce the surface area for attack.”

Read More

Tags: isolation technology, "risky web", browser isolation

Sandboxes Are Vulnerable but Not Obsolete. Can a Secure Web Gateway with Internet Isolation Save the Day?

Posted by Mehul Patel on Apr 15, 2019

Sandboxes Are Vulnerable but Not Obsolete. Can a Secure Web Gateway with Internet Isolation Save the Day?

Read More

Tags: secure web gateways, cyber security, isolation platform, browser isolation, web browser isolation, Web Security

Menlo’s Isolation Platform Stops YET Another Browser Exploit In Its Tracks

Posted by Menlo Labs on Mar 8, 2019

Menlo customers are 100% protected against a recent zero-day exploit in Google Chrome. The exploit CVE-2019-5786 is being actively used in limited attacks.

Read More

Tags: security breach, compromised websites, vulnerabilities

Emotet: A Small Change in Tactics Leads to a Spike in Attacks

Since mid-January 2019, Menlo Security has witnessed an uptick in the Emotet Trojan activity across our customer base, Based on our research we wanted to share some of the interesting observations.

 

Read More

Christmas, a time for giving…and patching? Really?

Posted by Menlo Security on Dec 20, 2018

A series of zero-day attacks seems to be a leading indicator of what's in store for IE in 2019!

Read More

Tags: browser isolation, vulnerabilities, malicious links

A "JAR" Full of Problems for Financial Services Companies

Posted by Menlo Labs on Dec 19, 2018

Menlo Labs has been tracking a malicious email campaign targeting employees of banks and financial services companies. The campaign, which appears to have been active in the U.S. and the UK since August, compromises PCs and other endpoints by tricking victims into clicking on malicious links to archive files. In all of the instances we’ve identified so far in this particular campaign, the archive files were either .zip or .gz files.

 

Read More

Menlo’s Vision to Revolutionize Web Security

Posted by Menlo Security on Nov 28, 2018

In the technology industry, the word “visionary” refers not just to the ability to see the future, but to actually change it. Quite a few companies achieve the first part of this definition. Very few pull off the second part.

Read More

How Isolation Would Have Stopped The Russian Election Cyberattacks

Posted by Jay Kelley on Jul 19, 2018

Regardless of the political fall-out from Special Counsel Robert J. Mueller’s indictment of twelve Russian intelligence operatives for tampering with the 2016 U.S. Presidential election, this much seems clear after reading the 29-page, John LeCarre-like document: It has become unreasonable to expect any organization to successfully defend against such a massive, coordinated cyberattack.

Read More

Tags: malware, phishing, isolation, credential theft, spear-phishing, remote browsing, cyberattacks, browser isolation, presidential election, Russian hackers, Russian operatives, Russian intelligence, DNC, DCCC, Podesta, cryptojacking, X-Agent, Mueller, U.S. election, GRU, Clinton Campaign, Democratic National Committee, Democratic Congressional Campaign Committee, Clinton, cryptocurrency

Connect with us

Lists by Topic

see all

Recent Posts