Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Netskope

Can a Single Pane of Glass Ever be Discovered for Cybersecurity?

In the ever-evolving landscape of cybersecurity, the concept of a ”single pane of glass” has long been the Holy Grail for many organisations. The idea is simple: consolidate all your cybersecurity tools and data onto a single dashboard for improved visibility and control.

Are Managed SASE Offerings the Wave of the Future? A Roundtable Discussion with GSI's & SP's

Organizations quickly adapted when they needed to suddenly support hybrid and remote workforces, often in inefficient and unsustainable ways. New technologies and new managed services can now help companies realize the full potential of SASE. In this roundtable discussion, you'll hear leading System Integrators and Service Providers talk about their clients’ top challenges and use cases, how that’s changed over the past three years, and where they see networking and security evolving over the coming years.

New DarkGate Variant Uses a New Loading Approach

In the past month, the Netskope Threat Labs team observed a considerable increase of SharePoint usage to deliver malware caused by an attack campaign abusing Microsoft Teams and SharePoint to deliver a malware named DarkGate. DarkGate (also known as MehCrypter) is a malware that was first reported by enSilo (now Fortinet) in 2018 and has been used in multiple campaigns in the past months.

Cyber Hygiene, Phishing, & Password Sharing: Tips from Cybersecurity Awareness Month 2023

As Cybersecurity Awareness Month 2023 draws to a close, we wanted to highlight some tips to keep in mind for the rest of the year, and beyond. In case you’ve missed it, we’ve been running a series of videos on our LinkedIn page throughout the month of October highlighting tips from members of our internal security team on topics like password sharing, keeping personal identifiable information safe, and maintaining good cyber hygiene.

The Cloud is Just Someone Else's Computer and They're Doing Things with it that You Need to Know

In this webinar, Netskope Chief Platform Officer, Joe DePalo, wades through the marketing hype, false claims and outdated approaches that cripple many clouds. Designed specifically for networking, infrastructure and operations leaders, Joe shares the most critical questions to ask your cloud providers. This webinar is particularly timely considering the shift to SASE and the convergence of security and networking.

Cloud Threats Memo: Multiple DarkGate Loader Campaigns Exploiting Legitimate Cloud Services

DarkGate Loader is a commodity malware loader with multiple features including the ability to download and execute files to memory, a Hidden Virtual Network Computing (HVNC) module, keylogging, information-stealing capabilities, and privilege escalation. Its distribution mechanism also makes use of legitimate AutoIt files to inject the malicious payload.

Level Up - SASE Accreditation and Practical Path to SASE

In an ever-evolving landscape of cybersecurity and network architecture, staying ahead is imperative. Watch this webinar to hear how Netskope SASE Accreditation can help you elevate your expertise and fortify your network security acumen. You'll learn the value, process and what you get when you complete the program.

Amazon-themed PDF Phishing, Abusing LinkedIn and Twitter, Targets Microsoft Live Outlook Users

In August 2023, Netskope Threat Labs highlighted an increase in downloads of PDF phishing attachments in Microsoft Live Outlook, caused by a series of phishing campaigns targeting users of the email service. We took a closer look and found that these campaigns are mostly Amazon-themed scams with a few Apple and IRS-themed phishing attempts sprinkled throughout. Just like in our previously reported phishing blog posts, attackers are abusing free services in these campaigns.

Netskope Threat Coverage: Menorah

In October 2023, Netskope analyzed a malicious Word document and the malware it contained, dubbed “Menorah.” The malware was attributed to an advanced persistent threat group APT34, and was reported to be distributed via spear-phishing. The malicious Office file uses dispersed and obfuscated VBA code to evade detection. The advanced persistent threat group targets users of outdated versions of Microsoft Office, since it does not attempt to bypass the mark of the web security check.