Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Netskope

The Cloud is Just Someone Else's Computer and They're Doing Things with it that You Need to Know

In this webinar, Netskope Chief Platform Officer, Joe DePalo, wades through the marketing hype, false claims and outdated approaches that cripple many clouds. Designed specifically for networking, infrastructure and operations leaders, Joe shares the most critical questions to ask your cloud providers. This webinar is particularly timely considering the shift to SASE and the convergence of security and networking.

Cloud Threats Memo: Multiple DarkGate Loader Campaigns Exploiting Legitimate Cloud Services

DarkGate Loader is a commodity malware loader with multiple features including the ability to download and execute files to memory, a Hidden Virtual Network Computing (HVNC) module, keylogging, information-stealing capabilities, and privilege escalation. Its distribution mechanism also makes use of legitimate AutoIt files to inject the malicious payload.

Level Up - SASE Accreditation and Practical Path to SASE

In an ever-evolving landscape of cybersecurity and network architecture, staying ahead is imperative. Watch this webinar to hear how Netskope SASE Accreditation can help you elevate your expertise and fortify your network security acumen. You'll learn the value, process and what you get when you complete the program.

Amazon-themed PDF Phishing, Abusing LinkedIn and Twitter, Targets Microsoft Live Outlook Users

In August 2023, Netskope Threat Labs highlighted an increase in downloads of PDF phishing attachments in Microsoft Live Outlook, caused by a series of phishing campaigns targeting users of the email service. We took a closer look and found that these campaigns are mostly Amazon-themed scams with a few Apple and IRS-themed phishing attempts sprinkled throughout. Just like in our previously reported phishing blog posts, attackers are abusing free services in these campaigns.

Netskope Threat Coverage: Menorah

In October 2023, Netskope analyzed a malicious Word document and the malware it contained, dubbed “Menorah.” The malware was attributed to an advanced persistent threat group APT34, and was reported to be distributed via spear-phishing. The malicious Office file uses dispersed and obfuscated VBA code to evade detection. The advanced persistent threat group targets users of outdated versions of Microsoft Office, since it does not attempt to bypass the mark of the web security check.

Accelerate Cloud Transformation with Netskope Borderless SD-WAN and AWS Cloud WAN

Navigating complex cloud networks with multiple clouds while ensuring secure and reliable access to workloads can be daunting. That’s why Netskope and AWS have teamed up to simplify this journey and make it a lot easier. Through the integration of Netskope Borderless SD-WAN with AWS Cloud WAN, teams can automate workload access from any remote site and user laptop, deliver a secure, reliable, flexible, and highly available middle-mile network service leveraging the AWS global network.

Navigating the Complex AI Regulatory Landscape - Transparency, Data, and Ethics

Ahead of the upcoming AI Safety Summit to be held at the UK’s famous Bletchley Park in November, I wanted to outline three areas that I would like to see the summit address, to help simplify the complex AI regulatory landscape. When we start any conversation about the risks and potential use cases for an artificial intelligence (AI) or machine learning (ML) technology, we must be able to answer three key questions.

Unlocking the Full Financial and Technical Value of SASE

The world we inherited from legacy network and security vendors has led to architectures suffering from excessive complexity and costs while making life difficult for administrators and end users alike. Platform convergence aligns the most important networking and security controls, enabling organizations to consolidate vendors and achieve significant cost savings.