<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1626328370711236&amp;ev=PageView&amp;noscript=1">
banner-blog.jpg

blog

Menlo’s Isolation Platform Stops YET Another Browser Exploit In Its Tracks

Posted by Menlo Labs on Mar 8, 2019

Menlo customers are 100% protected against a recent zero-day exploit in Google Chrome. The exploit CVE-2019-5786 is being actively used in limited attacks.

Read More

Tags: security breach, compromised websites, vulnerabilities

Emotet: A Small Change in Tactics Leads to a Spike in Attacks

Since mid-January 2019, Menlo Security has witnessed an uptick in the Emotet Trojan activity across our customer base, Based on our research we wanted to share some of the interesting observations.

 

Read More

Christmas, a time for giving…and patching? Really?

Posted by Menlo Security on Dec 20, 2018

A series of zero-day attacks seems to be a leading indicator of what's in store for IE in 2019!

Read More

Tags: browser isolation, vulnerabilities, malicious links

A "JAR" Full of Problems for Financial Services Companies

Posted by Menlo Labs on Dec 19, 2018

Menlo Labs has been tracking a malicious email campaign targeting employees of banks and financial services companies. The campaign, which appears to have been active in the U.S. and the UK since August, compromises PCs and other endpoints by tricking victims into clicking on malicious links to archive files. In all of the instances we’ve identified so far in this particular campaign, the archive files were either .zip or .gz files.

 

Read More

Menlo’s Vision to Revolutionize Web Security

Posted by Menlo Security on Nov 28, 2018

In the technology industry, the word “visionary” refers not just to the ability to see the future, but to actually change it. Quite a few companies achieve the first part of this definition. Very few pull off the second part.

Read More

How Isolation Would Have Stopped The Russian Election Cyberattacks

Posted by Jay Kelley on Jul 19, 2018

Regardless of the political fall-out from Special Counsel Robert J. Mueller’s indictment of twelve Russian intelligence operatives for tampering with the 2016 U.S. Presidential election, this much seems clear after reading the 29-page, John LeCarre-like document: It has become unreasonable to expect any organization to successfully defend against such a massive, coordinated cyberattack.

Read More

Tags: malware, phishing, isolation, credential theft, spear-phishing, remote browsing, cyberattacks, browser isolation, presidential election, Russian hackers, Russian operatives, Russian intelligence, DNC, DCCC, Podesta, cryptojacking, X-Agent, Mueller, U.S. election, GRU, Clinton Campaign, Democratic National Committee, Democratic Congressional Campaign Committee, Clinton, cryptocurrency

Compromised Websites and Download Bomb Attacks

Posted by Andrew Prince on Jul 11, 2018

Compromised Websites and Download Bomb Attacks

In recent weeks a resurgence of download bomb attacks has been observed in the wild, attempting to add legitimacy to malicious websites serving a tech support based phishing scam. For users of Menlo Security’s Isolation Platform (MSIP), this attack is trivially defeated with zero malicious content reaching the end user’s device. However, the same may not be said for reputation based security, as we review below.

Read More

Tags: malware, phishing, isolation, javascript, compromised websites, download bomb

Isolation: really making it 'FIN' for FIN7

Posted by Jay Kelley on Apr 10, 2018

It was reported on April 1st – appropriate that it was April Fool’s Day – by a number of media outlets that Hudson’s Bay Company, the Canada-based parent company of iconic luxury retailer Saks Fifth Avenue, as well as Lord & Taylor and Saks Off 5th, had been hacked. Reportedly, over 5 million credit and debit card numbers of customers of the retailers had been stolen, and supposedly were for sale on the Dark Web.

Read More

Tags: hacked, hackers, phishing attack, cyber security, isolation technology, browser isolation

Don’t Be a Wildebeest

Posted by Kowsik Guruswamy on Mar 29, 2018

 On the Serengeti, wildebeest have survived for millennia by using a simple strategy: safety in numbers. It’s great for the species, but each animal can only hope that another one will take one for the team.  

 

Read More

Tags: browser-based attacks, remote browsers, cyberattacks, isolation platform, trust, "risky web", safe web

Love and malware

Posted by Jay Kelley on Feb 14, 2018

 

 

“Love is like a virus. It can happen to anybody at any time.” – Maya Angelou

 

It’s Valentine’s Day, and love is in the air.

 

Unfortunately, so are emails riddled with malware.

Read More

Tags: malware, cyber security, isolation technology, isolation platform, virus

Connect with us

Lists by Topic

see all

Recent Posts