Working as a cybersecurity warrior has its perks. We’re on the front lines of an increasingly critical and dynamic battlefield, pitting increasingly sophisticated threats against increasingly sophisticated defenses. We’re doing important work, and it can be very rewarding.
It’s been a year since Gartner released its report on remote browser isolation. At the time, the report was forward thinking—controversial even—as it suggested that enterprises can no longer assume that their traditional detect-and-respond security strategy is enough to stop all web-based malware attacks. Analyst Neil MacDonald argued that enterprises should stop trying to detect every attack and instead focus on “containing the ability of the attacker to cause damage and reduce the surface area for attack.”
Sandboxes Are Vulnerable but Not Obsolete. Can a Secure Web Gateway with Internet Isolation Save the Day?
Menlo customers are 100% protected against a recent zero-day exploit in Google Chrome. The exploit CVE-2019-5786 is being actively used in limited attacks.
Since mid-January 2019, Menlo Security has witnessed an uptick in the Emotet Trojan activity across our customer base, Based on our research we wanted to share some of the interesting observations.
Menlo Labs has been tracking a malicious email campaign targeting employees of banks and financial services companies. The campaign, which appears to have been active in the U.S. and the UK since August, compromises PCs and other endpoints by tricking victims into clicking on malicious links to archive files. In all of the instances we’ve identified so far in this particular campaign, the archive files were either .zip or .gz files.
In the technology industry, the word “visionary” refers not just to the ability to see the future, but to actually change it. Quite a few companies achieve the first part of this definition. Very few pull off the second part.
Regardless of the political fall-out from Special Counsel Robert J. Mueller’s indictment of twelve Russian intelligence operatives for tampering with the 2016 U.S. Presidential election, this much seems clear after reading the 29-page, John LeCarre-like document: It has become unreasonable to expect any organization to successfully defend against such a massive, coordinated cyberattack.
Tags: malware, phishing, isolation, credential theft, spear-phishing, remote browsing, cyberattacks, browser isolation, presidential election, Russian hackers, Russian operatives, Russian intelligence, DNC, DCCC, Podesta, cryptojacking, X-Agent, Mueller, U.S. election, GRU, Clinton Campaign, Democratic National Committee, Democratic Congressional Campaign Committee, Clinton, cryptocurrency