IE and FIREFOX-Patching nightmare begins in 2020…

Not all vulnerabilities are created equal. It’s true. In a perfect world, organizations should be able to patch every vulnerability on every client immediately. But we don’t live in a perfect world. Some vulnerabilities pose a much greater risk to the organization than others and should be prioritized ... Read More

Financial Services Get Hooked, Experience 147% Increase in Phishing Clicks

| | phishing attack
According to JPMorgan Chase CEO Jamie Dimon, “The threat of cyber security may very well be the biggest threat to the US financial system.” Coupled with the fact that financial services is one of the most highly targeted industries, it’s clear financial organizations are in trouble. Reports show a 56% ... Read More

Menlo’s Cloud Security Platform protects users from cryptomining attack

The Internet keeps getting weirder, and users are getting harder to protect. Yet Menlo Security continues to keep users safe ... Read More

Why ANY Web Browser Is Still Not Safe…

Menlo Security customers are 100% protected against a recent zero-day exploit in Internet Explorer. The exploit CVE-2019-1367 and CVE-2019-1255 is being actively used in limited attacks ... Read More

Zoom Isolated = Safe Video calling !!

|
If you have been following the news, you probably noticed that the Internet is abuzz about the latest zero-day vulnerability in Zoom. The zero-day attack was identified by Jonathan Leitschuh, a security researcher who has detailed the vulnerability and has provided a PoC to reproduce the attack in this blog ... Read More

How Isolation Mitigates The Zoom Vulnerability

|
If you have been following the news, you probably noticed that the Internet is abuzz about the latest vulnerability in Zoom. The attack was identified by Jonathan Leitschuh, a security researcher who has detailed the vulnerability and has provided a PoC to reproduce the attack in this blog post. I ... Read More

Even Dropbox and Box aren’t Safe

Software as a service (SaaS) is changing the world, as nearly all new businesses use “as a service” solutions to ensure business productivity and seamless collaboration across different functions, both internally and externally to the organization. So why shouldn’t attackers take advantage of this open access and attempt to compromise ... Read More