
Tal Zamir
Founder and CTOfeature_status*/ ?>
Hysolate
Comments Dotted :
14
August 12, 2020
Zoom is one of the most popular non-browser apps these days, and its vulnerabilities should be among enterprises’ primary concerns.
Zoom is one of the most popular non-browser apps these days, and its vulnerabilities should be among enterprises’ primary concerns. Unfortunately, we'll see additional such vulnerabilities and subsequent attacks with collaboration tools such as Zoom, Teams, and Slack, as they all have a wide attack surface. To really protect against endpoint threats in a comprehensive way, enterprises should adopt OS isolation techniques that move sensitive enterprise apps, data, and credentials into a.....Read More

April 02, 2020
Zoom is one of the most popular non-browser apps these days.
Especially in the current situation, enterprises must keep in mind that user devices use a variety of apps that go beyond just email and internet. Zoom is one of the most popular non-browser apps these days, and has new vulnerabilities enterprises should care about.
This includes the recently discovered Zoom Client vulnerability that allows a remote attacker on a Zoom call to receive a user's Windows credentials. Unfortunately, we'll see an increase of such attacks on collaboration tools such.....Read More

March 25, 2020
The vulnerability is still unpatched to date.
The latest Windows 7 vulnerability gives enterprises yet another reason to migrate away from Windows 7. If a user opens a malicious document on Windows 7, the machine can be immediately compromised. The vulnerability is still unpatched to date. As a workaround, enterprises are advised to apply one of the mitigations provided by Microsoft in the link below.* For enterprises that are stuck with Windows 7 because the need to support legacy applications, consider using OS/VM isolation solutions.....Read More

March 19, 2020
The more users are working from home, the greater the risk.
A Virtual Private Network (VPN) might give employees (and organizations) a false sense of security. A VPN only secures the communication channel between the employee's workstation and the corporate network. However, as a massive amount of home workers now start to use their personal workstations to access corporate assets, it's only a matter of time until we see a soaring number of cyberattacks that originate from these personal devices that can be easily breached. If devices are infected with.....Read More

March 05, 2020
Attackers continue to target privileged users as they are practically their highway into the heart of the enterprise.
Attackers continue to target privileged users as they are practically their highway into the heart of the enterprise. Instead of fighting firewalls, hardened cloud services and perimeter defenses, determined attackers can follow a simpler two-step process to own an organization: the first step would be to identify a privileged user (e.g. an IT admin) based on his social network profiles; the second step would be to infect his laptop and to collect all of his credentials. By doing so, the.....Read More

March 04, 2020
Organizations should consider isolation solutions that take sensitive apps and systems and put them in a completely separate zone.
Using endpoint security agents or EDR engines can help detect known malicious behavior, but cannot really protect against advanced persistent threats that leverage fileless malware or malware-free techniques, such as using legitimate software and legitimate user actions to do harm. For example: a malicious actor that leverages legitimate video conferencing and remote control software (e.g. Webex/TeamViewer/Zoom) to spy on users and impersonate their actions would not use any malware and.....Read More

February 24, 2020
But they're still using the same techniques to get their way in - though endpoints.
For years we had been seeing the number of days it takes to identify a breach reduce year over year, but just this year that number climbed again and it's because attackers are getting better and smarter at covering their tracks. But they're still using the same techniques to get their way in - though endpoints. Once an attacker has made their way onto an endpoint, it's far too easy for them to gain access to credentials and pivot their way to sensitive information. We recommend that.....Read More

February 21, 2020
The biggest gap relates to users and their devices.
This is yet another example of attackers having the upper hand. Defenders have to protect a huge attack surface with multiple points of failure. The biggest gap relates to users and their devices. With over 5.7 million source code files and 50+ million lines of code (estimate), it’s almost impossible to successfully defend the operating system (OS) running on a user’s device. For this very reason, Microsoft is now recommending that users leverage an isolated and dedicated OS to conduct.....Read More

February 20, 2020
Isolation can be achieved by a strong physical or virtual "air gap".
Organizations that handle critical infrastructure cannot trust OS-based security solutions as these had been proven to fail over and over again, similar to this recent example of ransomware successfully hitting US-based OT networks. Instead, these organizations must apply isolation/segregation approaches both at the network level and at the endpoint level. Isolation can be achieved by a strong physical or virtual "air gap", but must ensure that the IT or OT assets do not have direct network.....Read More

February 14, 2020
70% of breaches still start on the endpoint.
This echoes a number of recent industry reports, where, despite all of our collective R&D and Investment in continuing to protect the endpoint through a variety of means, the results have not improved as much as we'd hope, and if anything, in some cases they've become worse:
1. 70% of breaches still start on the endpoint.
2. From 2018 to 2019, Dwell Time (the number of days a threat remains undetected within a given environment) increased from 85 to 95 days.And possibly most interestingly,.....Read More
