Knowledge Center
How ConcealBrowse Helps SOC Professionals Minimize Alerts and Improve Response Times
As a SOC professional, your role involves managing a high volume of security alerts and ensuring timely responses to potential threats. The rise of remote work and the increasing sophistication of cyber attacks have made this task even more challenging. But, we are here to help alleviate these challenges at the edge. Enter ConcealBrowse, an AI-powered browser security solution designed to simplify your workload and enhance SOC efficiency.
How ConcealBrowse Enhances Network Security and Proactive Threat Mitigation
As a network security professional, your role involves protecting your organization’s network from a myriad of cyber threats. The rise of remote work and the increasing sophistication of cyber attacks have made this task even more challenging. But, we have a solution to help address these challenges. Enter ConcealBrowse, an AI-powered browser security solution designed to simplify your workload and enhance network security.
How ConcealBrowse Helps CTOs Drive Innovation and Ensure Security
As a CTO, your primary responsibility is to drive technological innovation while maintaining robust security measures. The rise of remote work and increasing cyber threats have made this task even more challenging. But, we have a solution to help you overcome this challenge. Enter ConcealBrowse, an AI-powered browser security solution designed to simplify your workload and enhance security.
How ConcealBrowse Helps CIOs Streamline IT Management and Boost Security
As a CIO, you are tasked with optimizing technology to support business objectives while managing a complex IT landscape. The rise of remote work and increasing cyber threats have made this task even more challenging. Enter ConcealBrowse, an AI-powered browser security solution designed to simplify your workload and enhance IT efficiency.
How ConcealBrowse Helps CISOs Mitigate Risks and Enhance Security
As a CISO, you are constantly faced with the challenge of protecting your organization’s sensitive data while managing a complex security landscape. The rise of remote work and the increasing sophistication of cyber threats have made this task even more daunting. Enter ConcealBrowse, an AI-powered browser security solution designed to simplify your workload and enhance your browser security posture.
Securing Our Future: The Critical Role of Cybersecurity in U.S. Educational Institutions
As buds bloom and the air fills with the promise of spring, the continuous cycle of learning and education presses on. Yet, in our digitally interconnected era, this journey faces unprecedented challenges, notably in cybersecurity.
What is a ‘Browser in the Browser’ Phishing Attack?
Among the wide variety of browser threats organizations are having to deal with in 2024 is the 'Browser in the Browser' (BitB) phishing attack. This emergence poses a significant challenge to browser security. This blog post delves into the mechanics of BitB attacks, offering insights into how they work and tips on protecting yourself from falling victim.
Beyond Antivirus Software: The Case for Dedicated Browser Security
Antivirus software is the cornerstone of cybersecurity strategies for individuals and organizations alike. Yet, as cyber threats have evolved, the limitations of traditional antivirus solutions in protecting users during web browsing have become increasingly apparent.
Navigating the Waters of Phishing Attacks with Advanced Browser Security
In an era where digital threats loom at every corner, phishing attacks stand out for their oftentimes cunning simplicity yet devastating effectiveness. These deceptive tactics aim to steal personal and financial information by masquerading as trustworthy entities. As these threats evolve in sophistication, the need for robust browser security becomes not just advisable but essential for secure web browsing.
Can DNS Protect Against Browser Malware?
Amidst the myriad of technologies safeguarding our online interactions, DNS servers emerge as crucial yet often overlooked guardians. These servers act as the internet's phonebook, translating domain names into IP addresses. Their role is critical not just for connectivity but also for maintaining the security of our web browsing experiences.
Navigating the Web Safely: Understanding Social Engineering and Browser Security
In the vast and interconnected world of the internet, our reliance on browsers to explore, work, and socialize is undeniable. However, this convenience comes with its share of risks, especially from social engineering attacks that exploit human psychology rather than technological vulnerabilities. Understanding social engineering and its implications for browser security is crucial for secure web browsing.
The Crucial Role of Web Pages in Browser Security: A Deep Dive into AI-Powered Solutions
In today’s digital age, where the internet has become an indispensable part of daily life, the security of web pages we visit has never been more critical. With cyber threats lurking behind seemingly innocuous links, the need for comprehensive browser security measures, including the use of AI-Powered Browser Security extensions, has skyrocketed.
The Human Element in Cybersecurity: Our Greatest Strength and Vulnerability
In the ever-evolving cybersecurity landscape, the conversation frequently orbits around technological advancements, encryption protocols, and cutting-edge security tools. However, the most critical component in the cybersecurity equation remains the human element.
Explaining The AI-Powered Browser Security Extension for Secure Web Browsing
In the vast expanse of the internet, where digital threats loom at every corner, securing your online experience has become paramount. Enter Conceal, the cutting-edge AI-Powered Browser Security extension designed to redefine secure web browsing.
Enhancing User Experience Through AI-Powered Browser Security
In the digital age, secure web browsing is not just a preference; it's a necessity. With cyber threats evolving at an alarming rate, particularly in the form of sophisticated phishing attacks, the demand for robust browser security measures has never been higher.
The Human Element in Cybersecurity: A Frontline Perspective
In today’s rapidly evolving digital landscape, where technology seems to outpace security measures at every turn, the human element of cybersecurity remains both its most vulnerable point and its strongest asset.
Fortifying the Frontlines: Transforming Cybersecurity in the Age of Sophisticated Phishing and Social Engineering
In the digital age, where connectivity and convenience are prized above all, the threats lurking in the shadows of our online world have become more sophisticated and insidious. Phishing and social engineering represent the cutting edge of cybercrime, continually evolving to outmaneuver even the most vigilant of defenses.
The Rise of Browser-Based Phishing Attacks and Expectations for 2024
There has been a 198% increase in browser-based phishing attacks, emphasizing the need for enterprise browser security solutions.
Conceal’s Year in Review: Innovations, Challenges, and Successes
As we bid farewell to another eventful year, it’s time to reflect on the milestones, challenges, and triumphs that have shaped Conceal over the past twelve months.
Navigating the Cyber Seas with Conceal’s AI Engine: A Deep Dive into AI-Powered Browser Security
Following our exploration of the vital role of Artificial Intelligence (AI) in browser security strategies, it's time to delve into a specific, cutting-edge solution: ConcealBrowse's AI engine.
Embracing the Future: The Crucial Role of Artificial Intelligence in Browser Security Strategies
We all have heard that traditional security measures are no longer sufficient in the ever-evolving landscape of cyber threats.
ConcealBrowse Analysis: Mitigating Emerging Cyber Threats in the Tech Industry
A forward-thinking technology company recognizing the evolving nature of cyber threats, strategically integrated ConcealBrowse into its cybersecurity framework. This move proved its worth when ConcealBrowse successfully isolated a high-risk domain, mograppido[.]com, that posed a significant threat to the company's network.
ConcealBrowse Analysis: Thwarting Advanced Cyber Threats in the Chemical Industry
Facing an ever-increasing cyber threat landscape, an integrated chemical and equipment company recognized the need for enhanced cybersecurity measures and strategically invested in ConcealBrowse.
ConcealBrowse Analysis: The Hidden Risks of Shared Hosting
In the intricate cybersecurity landscape, where threats evolve daily, tools like ConcealBrowse provide a much-needed safety net. A recent threat analysis for a hedge fund highlighted how ConcealBrowse's smart decision engine leverages its "proximity" metric to identify potential threats, even when not directly implicated as malicious.
The “Non-Subscribe” Attack: How ConcealBrowse Shields the Human Layer
It's no longer a surprise that the cyber threat landscape is continuously evolving, and cybercriminals are relentlessly innovating ways to infiltrate and exploit unsuspecting users. The most recent deceptive method brought to our attention is the "Non-Subscribe" attack.
Introducing ConcealBrowse for Firefox Users!
As we continue to expand our solution here at Conceal to best fit our customer needs, we are pleased to announce that ConcealBrowse is now available for Firefox!
ConcealBrowse: A Communications Company’s First Line of Defense
In an era where every click could lead to a potential security breach, a prominent communications company took a proactive approach. Recognizing the ever-growing spectrum of cyber threats, the company invested in ConcealBrowse. This cybersecurity solution would soon prove its worth in an unexpected way.
ConcealBrowse: Shielding IT Solutions from Stealthy Threats
In the rapidly evolving landscape of IT, staying ahead of threats is paramount. This imperative led to the adoption of ConcealBrowse, an advanced cybersecurity tool. For one IT solution in particular, this investment turned out to be not just prudent but crucial.
ConcealBrowse: Successfully Isolating a Threat Beyond Edge Controls
Cybersecurity has become a vital component of any organization's technological infrastructure, especially given the escalating threats in the digital sphere. Recently, a tech company made a strategic decision to invest in ConcealBrowse, which proved instrumental when a threat evaded the firm's existing proactive edge controls.
ConcealBrowse: A Frontline Defense in Isolating a Threat That Outsmarted Edge Controls
As cyber threats become increasingly sophisticated, the need for advanced protective measures grows more urgent. Recognizing this, a forward-thinking state government organization recently invested in our cybersecurity solution: ConcealBrowse. This advanced tool proved crucial when a subtle threat slipped past all the organization's other proactive controls at the edge.
Browser-Based Threat Alert: Meta Highlights Threats Against Business Accounts on its Social Platforms
Cyberattacks targeting personal accounts connected to business pages on social media platforms can result in unauthorized ads, financial losses, and significant damage to brand reputation. Facebook parent company Meta recently took down 1,000 URLs with malware targeting businesses’ social media accounts.
Browser Based-Threat Alert: Bumblebee Malware Campaign – When Malicious Ads Meet Compromised Websites
Threat actors are using search ads and compromised websites to deliver malware disguised as legitimate software. Find out how ConcealBrowse can keep your users safe from this insidious attack.
Browser-Based Threat Report: ConcealBrowse Thwarts Sophisticated Spear Phishing Attack Targeting Conceal CEO
Conceal CEO Gordon Lawson was recently targeted by a sophisticated spear phishing attack that bypassed multiple security measures. Fortunately, ConcealBrowse detected the threat and ensured that Conceal - and our customers - remained safe.
Browser-Based Threat Report: The Tax Day Tangle – Cybercriminals’ Taking Advantage of Stressful Season to Deliver Malware
As the April 18 tax deadline approaches, cybercriminals are taking advantage of this time-sensitive and stressful period to launch a targeted phishing campaign with the goal of gaining unauthorized access to sensitive personal information.
Tech Spotlight: ConcealBrowse Dashboard – Enhancing Visibility and Security Control
In today’s digital landscape, organizations are continuously exposed to threats that bypass other security controls. ConcealBrowse offers a comprehensive solution that provides protection against malicious activity undetected by conventional security measures. Additionally, the corresponding dashboard provides enhanced visibility and insights into activities that may go unnoticed by other tools. In this tech spotlight blog, we’ll explore the features of the ConcealBrowse Dashboard and discuss how it can help organizations improve their security posture.
Browser-Based Threat Alert: Increased Phishing Attacks on Collaboration Platforms Highlight the Importance of Zero-Trust Browser Protection
The threat of phishing attacks is only growing in the era of hybrid work and digital collaboration. Cybercriminals are increasingly targeting collaboration platforms such as Slack and Microsoft Teams. Companies are grappling with a growing threat surface, and many feel vulnerable to attacks delivered through their collaboration tools. To protect against these evolving threats, businesses must adopt zero-trust web browser protection tools like ConcealBrowse.
The Growing Impact of Cybersecurity on Credit Ratings: What Companies Need to Know
Credit rating agencies are increasingly looking at a company's cybersecurity posture when determining credit ratings. Companies that have suffered major cybersecurity incidents are now more likely to see their credit ratings downgraded. Read on to find out how companies can improve their financial health in tandem with their security posture.
Browser-Based Threat Alert: SVB Opportunistic Phishing Attacks
The collapse of Silicon Valley Bank (SVB) and subsequent phishing attacks targeting its customers offer a cautionary tale and highlight the importance of zero-trust protection measures.
How to Increase Your Profitability as an MSP
We know that as a managed service provider, increased profitability is critical to growth and success in the industry. As an MSP, having the right strategic partner allows you to expand your services while streamlining effective operations and investing in services that result in recurring revenue. At Conceal, we're invested in helping you implement a strategy that includes maximizing profitability.
Conceal Threat Alert: Phishing Attack Bypasses Traditional Controls, ConcealBrowse to the Rescue
Attackers continue to innovate in their efforts to bypass traditional security controls and deliver credential theft links to unsuspecting users. In an environment rich with information about how security controls work and what entices users to click, there is a distinct need for improved protection in the browser.
Browser-Based Threat Alert: Iranian Government Actors Mimic Think Tank for Targeted Phishing Attacks
Researchers recently discovered sophisticated and well-targeted phishing attacks against researchers documenting suppression of Iranian minority groups. The actors, likely affiliated with the Iranian government, mounted extensive, long-term social engineering operations to gain the victims’ trust and steal their information.
4 Secrets MSPs Should Know About Browser Security
As an MSP, it is your mission to provide your customers with tailored technology solutions and services that meet their specific needs and help them reach their business goals. Implementing security measures is an essential part of this, as it reduces the risk of cyber incidents. But what if implementing security measures not only increased the organization's security posture but also saved you time and money? By investing in a comprehensive browser security tool, you can go beyond just protecting the edge.
Conceal Threat Alert: Phishing Attack Threatens Physical Security of Homes
As smart home features become more common, cyber attacks can present real physical threats to users. A new report highlights a phishing attack designed to bypass email-based security measures that could result in attackers having access to a users’ home as well as their bank accounts.
Conceal Threat Alert: Hackers Mimicking ChatGPT to Spread Malware
A new malware, the ChatGPT Stealer, is targeting users of the AI-powered chatbot, ChatGPT, and stealing personal information from the infected user's device. The attackers used the trusted reputation of ChatGPT to convince users to download a credential-stealing trojan that pretended to be a ChatGPT app.
Why ConcealBrowse?
As the internet becomes an ever-growing part of our daily lives, with 65% of the population projected to be using it by 2023, cyber risks initiated in the browser are growing exponentially. To protect ourselves from these threats, we need browser extensions that focus on security and privacy. To address these issues, browser extensions such as ConcealBrowse are gaining traction. Taking a deep dive into browser security, we explore how ConcealBrowse works and its top 4 benefits.
Conceal Threat Alert: Coinbase Employee Compromised via SMS Phishing Attack
A recent cyberattack on cryptocurrency exchange Coinbase highlights the growing threat facing organizations. The attack was carried out by sending fake SMS messages that appeared to be from the company’s security team. However, these messages included malicious links that redirected employees to a phishing website, allowing attackers to take control of their accounts and access sensitive data.
Browser-Based Threat Alert: ChatGPT May Be Causing More Harm Than Good
ChatGPT is a machine model that appears to be ethical but can be used for malicious purposes such as writing phishing emails and malicious code. It has proven to be capable of writing "fairly decent malware” and can be used for a variety of nefarious activities, including spam, espionage, and ransomware. To protect against these threats, organizations must take proactive steps to ensure browser security is an integral part of their cybersecurity strategy.
Conceal Threat Alert: Attackers Behind “Screenshotter” Malware Hit Tens of Thousands of Targets in US and Germany
Proofpoint recently reported on a new threat actor referred to as TA886, targeting organizations in the US and Germany via custom malware called "Screenshotter." The malware was accessed via URLs sent to tens of thousands of email addresses, resulting in network compromises, data loss, and credential theft.
Customer Testimonial: The Power of ConcealBrowse – Protecting Organizations When Trusted Sites are Compromised
A Conceal customer recently reported a successful instance of ConcealBrowse protecting their employees from a malicious partner website. An employee of the company attempted to access a partner site, only to find that attackers had replaced a link they used regularly with one that would lead them to a harmful website. ConcealBrowse immediately identified this link as malicious, and it was isolated to prevent it from affecting the customer's network.
Phishing Attacks Evade Traditional Security Defenses
It’s no question that phishing attacks are evolving; threat actors are increasing in sophistication and their ability to bypass traditional security defenses. Traditional security training is no longer enough to protect your organization – it’s time for a new approach. To defend against phishing attacks in 2023, each email link clicked, and every URL visited, needs to be filtered on an instance-by-instance basis. To minimize the success of social engineering attacks, the zero-trust model is crucial.
Conceal Threat Alert: Reddit Internal Systems Compromised by Targeted Phishing Attack
Reddit faced a security incident that resulted from a sophisticated, highly-targeted phishing attack against its employees. Conceal’s browser-based phishing protection extension, ConcealBrowse could have helped prevent the attack by adding an extra layer of security to the browsing experience and preventing users from entering their credentials into malicious web sites.
Making the Most Out of 2023 Cyber Budgets
A recent study released by Neustar International Security Council found that only half of the responding companies have sufficient budgets to address their cybersecurity needs. Organizations need to think outside the box when developing their 2023 roadmap to maximize security with their constrained budgets. Introducing ConcealBrowse, an affordable secure browser solution that can help organizations maximize their investment in security, at the edge.
Conceal Threat Alert: Data Breach at MailChimp
A data breach at Mailchimp provided vital information to cyber criminals that could enable them to create highly targeted and especially effective phishing attacks against FanDuel customers. Read about the attack, and how ConcealBrowse’s anti-phishing protection can protect your company from these types of attacks.
Traditional Endpoint Protection Platforms Are No Longer Sufficient
With the growing sophistication of threat actors, endpoint protection solutions need to transform their approach to maximize value for their customers.
Conceal Threat Alert: Government Employees Money Stolen through Targeted Phishing Campaign
In October 2022, CISA identified a widespread cyber campaign involving the malicious use of legitimate remote monitoring and management (RMM) software. Criminal actors sent phishing emails that led to the download of legitimate RMM software which the actors used in a refund scam to steal money from victim bank accounts. The actors used the software to steal banking credentials from government employees.
Conceal Threat Alert: Re-used Passwords Result in Breach of 35,000 PayPal Accounts
35,000 PayPal accounts were recently breached, resulting in the theft of personal information including Social Security numbers and contact information. While this was the culmination of what was likely a series of complex attacks, better security in the browser with advanced phishing protection and malware protection could have stopped it before it started.
Conceal Threat Alert: Chinese Threat Actor Targets Users in WhatsApp
A prolific Chinese threat actor is abusing people’s trust of brands to distribute malware and conduct fraud on a massive scale. The actor sends malicious links via WhatsApp, highlighting the growing threat of malicious links delivered via applications outside of email, where many anti-phishing protection measures are focused.
It’s 2023 and We Are Still Worried About Ransomware
Ransomware continues to cripple organizations and countries, but why? The answer is simple - there is a gap in tooling. Many organizations continue to invest in tooling to address ransomware-related objectives. Despite the investments being made, the tooling doesn't solve for ransomware's biggest challenges. 85% of ransomware attacks originate with phishing attacks on end users, and the method has evolved exponentially. While there are growing vectors for phishing, one thing remains constant - the browser is a critical gateway for all attack types.
Conceal Threat Alert: Despite Boosted Funding and Attention, 2022 Saw No Improvement in Government Ransomware Defense
Despite new legislation and skyrocketing cyber security spending, government, health, and educational institutions saw no reduction in the number of successful ransomware attacks in 2022. These attacks have resulted in massive ransom payments that make it more difficult for these organizations to carry out their missions, and have even resulted in direct physical harm in medical settings. How can organizations fight back?
Don’t Blame the User for Clicking on Links
It can be difficult for even the most well-trained users to spot malicious links. No amount of cyber security training can negate the fact that clicking links is something everyone has to do dozens or hundreds of times per day as part of their job. Find out how to remove from your employees the burden of keeping your company secure.
Conceal Threat Alert: Attackers Using Search Engine Ads to Beat Antiphishing Software.
The FBI recently made an announcement concerning the use of web search advertising combined with classic phishing techniques to trick users into downloading ransomware or providing their credentials to cyber criminals. Find out more about this threat and how Conceal can prevent you from becoming a victim.
Conceal Threat Alert: New Malware Families
Several new ransomware variants hit the Internet in 2022. Find out more about three of the most common ones, and see how ConcealBrowse can help provide ransomware protection against some of the most common delivery methods with dynamic next-generation remote browsing isolation and phishing protection built in.
Browser-Based Threat Alert: Russian Campaign
A likely Russian advanced persistent threat actor has been utilizing phishing campaigns to steal credentials of Western military and strategic research targets. This attack uses an interesting social engineering trick as to circumvent common phishing protection tools. Find out how Conceal’s Internet browsing security solution incorporating dynamic remote browser isolation can help prevent similar attacks.
Browser-Based Threat Alert: Disneyland Malware Team
Recently, Krebs on Security reported on a financial crime group called the "Disneyland Team" that uses an uncommon phishing technique. This method makes use of a little-known feature built into most web browsers to render domain names with non-Latin characters. Called Punycode, the feature takes a URL that contains special character strings and renders them using non-Latin characters. These are the types of user trust attacks that ConcealBrowse defeats. To identify and block these attacks, ConcealBrowse relies on advanced phishing identification and an intelligence-fed decision engine instead of allowing users to make decisions based on their own trust and ability to spot suspicious sites.
What’s the best browser security solution? One that ignores users’ trust.
Implementing zero-trust principles across your network and throughout your organization is an expensive and time-consuming process. In fact, recent research shows that while 91% of companies are aware of or want to deploy zero-trust security measures, only 12% are fully deployed. With an increasing amount of work happening in the browser, both on and off your network, you need the best browser security solution to push zero-trust to the edge quickly and affordably. That's where ConcealBrowse comes in with smart, dynamic remote browser isolation and phishing protection built in.
Conceal Threat Alert: Aurora Malware as a Service Targets Crypto Wallets & Credentials
Sekoia, a cybersecurity solution provider, reported a recently discovered piece of malware dubbed “Aurora” by its developer. According to the report, Aurora is advertised as a malware-as-a-service that can be hired to steal credentials for cryptocurrency wallets and criminal groups wasted no time in developing engineering and phishing approaches to distribute the malware. Fortunately, ConcealBrowse ensures that no matter how good a social engineering technique is, a user’s actions cannot result in a successful attack on your organization's network. Read more in our latest blog to find out how ConcealBrowse can keep your organization safe from phishing, ransomware, and all other types of malware delivered through the browser.
Conceal Threat Alert: Instagram Users Targeted in Phishing Attack
Armorblox recently identified a credential theft phishing attack targeting over 20,000 Instagram users at a national institution within the Education Industry. The attack leveraged several common techniques to convince users that the email and linked login page were legitimately associated with Instagram. Fortunately, ConcealBrowse’s simple plug-and-play secure browser extension can stop these attacks by blocking phishing sites before they are even opened. Read more in our latest blog!
Browser-Based Threat Alert: BATLOADER
A recent report by Mandiant shows the discovery of a new piece of malware they called “BATLOADER”. The malware is delivered via malicious websites that are disguised as download sites for legitimate consumer software. Unlike some malware that takes advantage of zero-day vulnerabilities to compromise a system without user interaction, BATLOADER requires the user to download and execute the malicious file. Fortunately, ConcealBrowse protects against this attack by making decisions about what to load and how to load it based on facts and data, not on trust. Read more in our recent blog to see how ConcealBrowse can stop these attacks and prevent malware from ever entering your organization's network.
Conceal Threat Alert: Phishing Incident Targeting Dropbox
Dropbox reported they were recently the target of a phishing campaign that gave the attackers access to the company’s source code for internal prototypes, as well as some of the tools used by their security team. Check out our latest blog to learn how ConcealBrowse could have prevented this attack.
WWCD: Staying One Step Ahead of the Attack
With browser zero days being discovered all the time – and frequently not until they’ve already been exploited – how can companies protect themselves during the period between the initial exploitation and when they are able to install the latest browser update? Check out our latest blog to learn what Conceal would do.
#BeCyberSmart – Let’s Talk About Phishing
Let’s talk about phishing. Phishing is the top action variety in social engineering breaches, causing over 60% according to Verizon’s Data Breach Investigation report for 2022. Since 2016, phishing has seen an exponential increase in both the email click and do not click rates. This week, the National Cybersecurity Alliance has talked a lot about recognizing and reporting phishing and discussed.
WWCD: Defending Against Browser App Mode Abuse
Bill Toulas at Bleeping Computer recently highlighted a new phishing technique in the wild that is designed to abuse user’s increased likelihood of trusting applications that appear to be desktop applications over those that appear inside a web browser. So what would Conceal do? Read our latest blog to find out.
WWCD: How can ConcealBrowse stop abuse of trust?
We all know from experience that regardless of how much training users receive, they far to often let down their guard when they believe they are interacting with a trusted party. Fortunately, Conceal takes over the task of distrusting everything and isolating malicious activity regardless of the user’s perception of safety. Read our latest blog to learn more.
Welcome to National Cybersecurity Awareness Month!
We are thrilled to announce that we are an official champion of National Cybersecurity Awareness Month (NCSAM)! What is NCSAM you ask? It’s only the best month of the year for the cybersecurity community! NCSAM started 19 years ago as a partnership between the National Cybersecurity Alliance (NCA) and the U.S. Department of Homeland Security (DHS).
WWCD: Could Conceal Have Stopped Lapsus$?
Several multinational companies have been in the news in recent months thanks to being victims of the prolific data extortion group known as Lapsus$. The most recent victims are Uber and Grand Theft Auto videogame producer Rockstar Games. However, Lapsus$ has been in the news for a majority of 2022 with successful attacks on Okta, Microsoft, Samsung, and others. Could these attacks have been prevented?
Are You Ready for Mandatory Cybersecurity Disclosure?
Vulnerability exploitation will continue to be a key entry point into your organization’s network. As a result, security teams must explore proactive security measures and tools that can be leveraged to minimize threat actors’ ability to take advantage of a vulnerability. Conceal provides part of the necessary proactive security measures by stopping malware before it has a chance to exploit unpatched vulnerabilities.
“CONCEALing” Browser Context Through our Patented SDN
Threat actors can't attack you if they can't find you. With an additional layer of protection, you can make it much more difficult for attackers to trace web activity back to your organization or to find cloud applications and infrastructure that are critical to your business. This protection is what we call the 'privacy fabric'.
4 Key Information Security Threats of 2022
Vulnerability exploitation will continue to be a key entry point into your organization’s network. As a result, security teams must explore proactive security measures and tools that can be leveraged to minimize threat actors’ ability to take advantage of a vulnerability. Conceal provides part of the necessary proactive security measures by stopping malware before it has a chance to exploit unpatched vulnerabilities.
Now All Together
A 2020 research paper by cybersecurity think tank USENIX highlights a key problem with cyber intelligence data: Even though commercial threat data is expensive, it paints an incomplete picture of the risk to your company.
Change Maker | Building a Culture and Protecting our Online Presence
Conceal colleagues, Gordon Lawson, CEO and Ivie Teston, Inside Sales Manager sat down recently with Deke Copenhaver, host of The Changemaker podcast series to talk about establishing a welcoming work culture, what it takes to engage a young workforce, and how our online presence might not be as safe as you think.
Searching the Internet Safely and Anonymously
Everyone has seen the famous The New Yorker cartoon (July 5, 1993) where a dog behind a computer informs a canine friend sitting nearby that “On the Internet, nobody knows you’re a dog.” There’s only one problem with this memorable phrase. It’s not true anymore.
Protection Through Isolation
Security professionals are well aware that sending an email to a colleague has always been the digital equivalent of sending a postcard. Now, given the aggressiveness and skill of today’s hackers, the situation with data on the internet is hardly much better. If your file storage has a public IP address, your data is vulnerable to attack.
If Malware Gets into your Network, It’s Too Late!
Security organizations face a disturbing escalation in the number of threats – up 31% in 2021. Even more important, though, is their increasing variety and sophistication. The ConcealBrowse system uses a new tactic: isolation.
How ConcealBrowse Helps MSPs and MSSPs Expand Services and Increase Revenue
As an MSP or MSSP, your primary responsibility is to deliver top-notch security solutions to your clients while driving revenue and operational efficiency. The growing demand for cybersecurity solutions and the increasing sophistication of cyber threats make this task even more challenging. We are here to alleviate these challenges at the edge. Enter ConcealBrowse, an AI-powered browser security solution designed to enhance your service offerings and expand your business.
How ConcealBrowse Helps SOC Professionals Minimize Alerts and Improve Response Times
As a SOC professional, your role involves managing a high volume of security alerts and ensuring timely responses to potential threats. The rise of remote work and the increasing sophistication of cyber attacks have made this task even more challenging. But, we are here to help alleviate these challenges at the edge. Enter ConcealBrowse, an AI-powered browser security solution designed to simplify your workload and enhance SOC efficiency.
How ConcealBrowse Enhances Network Security and Proactive Threat Mitigation
As a network security professional, your role involves protecting your organization’s network from a myriad of cyber threats. The rise of remote work and the increasing sophistication of cyber attacks have made this task even more challenging. But, we have a solution to help address these challenges. Enter ConcealBrowse, an AI-powered browser security solution designed to simplify your workload and enhance network security.
How ConcealBrowse Helps CTOs Drive Innovation and Ensure Security
As a CTO, your primary responsibility is to drive technological innovation while maintaining robust security measures. The rise of remote work and increasing cyber threats have made this task even more challenging. But, we have a solution to help you overcome this challenge. Enter ConcealBrowse, an AI-powered browser security solution designed to simplify your workload and enhance security.
How ConcealBrowse Helps CIOs Streamline IT Management and Boost Security
As a CIO, you are tasked with optimizing technology to support business objectives while managing a complex IT landscape. The rise of remote work and increasing cyber threats have made this task even more challenging. Enter ConcealBrowse, an AI-powered browser security solution designed to simplify your workload and enhance IT efficiency.
How ConcealBrowse Helps CISOs Mitigate Risks and Enhance Security
As a CISO, you are constantly faced with the challenge of protecting your organization’s sensitive data while managing a complex security landscape. The rise of remote work and the increasing sophistication of cyber threats have made this task even more daunting. Enter ConcealBrowse, an AI-powered browser security solution designed to simplify your workload and enhance your browser security posture.
Securing Our Future: The Critical Role of Cybersecurity in U.S. Educational Institutions
As buds bloom and the air fills with the promise of spring, the continuous cycle of learning and education presses on. Yet, in our digitally interconnected era, this journey faces unprecedented challenges, notably in cybersecurity.
What is a ‘Browser in the Browser’ Phishing Attack?
Among the wide variety of browser threats organizations are having to deal with in 2024 is the 'Browser in the Browser' (BitB) phishing attack. This emergence poses a significant challenge to browser security. This blog post delves into the mechanics of BitB attacks, offering insights into how they work and tips on protecting yourself from falling victim.
Beyond Antivirus Software: The Case for Dedicated Browser Security
Antivirus software is the cornerstone of cybersecurity strategies for individuals and organizations alike. Yet, as cyber threats have evolved, the limitations of traditional antivirus solutions in protecting users during web browsing have become increasingly apparent.
Navigating the Waters of Phishing Attacks with Advanced Browser Security
In an era where digital threats loom at every corner, phishing attacks stand out for their oftentimes cunning simplicity yet devastating effectiveness. These deceptive tactics aim to steal personal and financial information by masquerading as trustworthy entities. As these threats evolve in sophistication, the need for robust browser security becomes not just advisable but essential for secure web browsing.
Can DNS Protect Against Browser Malware?
Amidst the myriad of technologies safeguarding our online interactions, DNS servers emerge as crucial yet often overlooked guardians. These servers act as the internet's phonebook, translating domain names into IP addresses. Their role is critical not just for connectivity but also for maintaining the security of our web browsing experiences.
Navigating the Web Safely: Understanding Social Engineering and Browser Security
In the vast and interconnected world of the internet, our reliance on browsers to explore, work, and socialize is undeniable. However, this convenience comes with its share of risks, especially from social engineering attacks that exploit human psychology rather than technological vulnerabilities. Understanding social engineering and its implications for browser security is crucial for secure web browsing.
The Crucial Role of Web Pages in Browser Security: A Deep Dive into AI-Powered Solutions
In today’s digital age, where the internet has become an indispensable part of daily life, the security of web pages we visit has never been more critical. With cyber threats lurking behind seemingly innocuous links, the need for comprehensive browser security measures, including the use of AI-Powered Browser Security extensions, has skyrocketed.
The Human Element in Cybersecurity: Our Greatest Strength and Vulnerability
In the ever-evolving cybersecurity landscape, the conversation frequently orbits around technological advancements, encryption protocols, and cutting-edge security tools. However, the most critical component in the cybersecurity equation remains the human element.
Explaining The AI-Powered Browser Security Extension for Secure Web Browsing
In the vast expanse of the internet, where digital threats loom at every corner, securing your online experience has become paramount. Enter Conceal, the cutting-edge AI-Powered Browser Security extension designed to redefine secure web browsing.
Enhancing User Experience Through AI-Powered Browser Security
In the digital age, secure web browsing is not just a preference; it's a necessity. With cyber threats evolving at an alarming rate, particularly in the form of sophisticated phishing attacks, the demand for robust browser security measures has never been higher.
The Human Element in Cybersecurity: A Frontline Perspective
In today’s rapidly evolving digital landscape, where technology seems to outpace security measures at every turn, the human element of cybersecurity remains both its most vulnerable point and its strongest asset.
Fortifying the Frontlines: Transforming Cybersecurity in the Age of Sophisticated Phishing and Social Engineering
In the digital age, where connectivity and convenience are prized above all, the threats lurking in the shadows of our online world have become more sophisticated and insidious. Phishing and social engineering represent the cutting edge of cybercrime, continually evolving to outmaneuver even the most vigilant of defenses.
The Rise of Browser-Based Phishing Attacks and Expectations for 2024
There has been a 198% increase in browser-based phishing attacks, emphasizing the need for enterprise browser security solutions.
Conceal’s Year in Review: Innovations, Challenges, and Successes
As we bid farewell to another eventful year, it’s time to reflect on the milestones, challenges, and triumphs that have shaped Conceal over the past twelve months.
Navigating the Cyber Seas with Conceal’s AI Engine: A Deep Dive into AI-Powered Browser Security
Following our exploration of the vital role of Artificial Intelligence (AI) in browser security strategies, it's time to delve into a specific, cutting-edge solution: ConcealBrowse's AI engine.
Embracing the Future: The Crucial Role of Artificial Intelligence in Browser Security Strategies
We all have heard that traditional security measures are no longer sufficient in the ever-evolving landscape of cyber threats.
ConcealBrowse Analysis: Mitigating Emerging Cyber Threats in the Tech Industry
A forward-thinking technology company recognizing the evolving nature of cyber threats, strategically integrated ConcealBrowse into its cybersecurity framework. This move proved its worth when ConcealBrowse successfully isolated a high-risk domain, mograppido[.]com, that posed a significant threat to the company's network.
ConcealBrowse Analysis: Thwarting Advanced Cyber Threats in the Chemical Industry
Facing an ever-increasing cyber threat landscape, an integrated chemical and equipment company recognized the need for enhanced cybersecurity measures and strategically invested in ConcealBrowse.
ConcealBrowse Analysis: The Hidden Risks of Shared Hosting
In the intricate cybersecurity landscape, where threats evolve daily, tools like ConcealBrowse provide a much-needed safety net. A recent threat analysis for a hedge fund highlighted how ConcealBrowse's smart decision engine leverages its "proximity" metric to identify potential threats, even when not directly implicated as malicious.
The “Non-Subscribe” Attack: How ConcealBrowse Shields the Human Layer
It's no longer a surprise that the cyber threat landscape is continuously evolving, and cybercriminals are relentlessly innovating ways to infiltrate and exploit unsuspecting users. The most recent deceptive method brought to our attention is the "Non-Subscribe" attack.
Introducing ConcealBrowse for Firefox Users!
As we continue to expand our solution here at Conceal to best fit our customer needs, we are pleased to announce that ConcealBrowse is now available for Firefox!
ConcealBrowse: A Communications Company’s First Line of Defense
In an era where every click could lead to a potential security breach, a prominent communications company took a proactive approach. Recognizing the ever-growing spectrum of cyber threats, the company invested in ConcealBrowse. This cybersecurity solution would soon prove its worth in an unexpected way.
ConcealBrowse: Shielding IT Solutions from Stealthy Threats
In the rapidly evolving landscape of IT, staying ahead of threats is paramount. This imperative led to the adoption of ConcealBrowse, an advanced cybersecurity tool. For one IT solution in particular, this investment turned out to be not just prudent but crucial.
ConcealBrowse: Successfully Isolating a Threat Beyond Edge Controls
Cybersecurity has become a vital component of any organization's technological infrastructure, especially given the escalating threats in the digital sphere. Recently, a tech company made a strategic decision to invest in ConcealBrowse, which proved instrumental when a threat evaded the firm's existing proactive edge controls.
ConcealBrowse: A Frontline Defense in Isolating a Threat That Outsmarted Edge Controls
As cyber threats become increasingly sophisticated, the need for advanced protective measures grows more urgent. Recognizing this, a forward-thinking state government organization recently invested in our cybersecurity solution: ConcealBrowse. This advanced tool proved crucial when a subtle threat slipped past all the organization's other proactive controls at the edge.
Browser-Based Threat Alert: Meta Highlights Threats Against Business Accounts on its Social Platforms
Cyberattacks targeting personal accounts connected to business pages on social media platforms can result in unauthorized ads, financial losses, and significant damage to brand reputation. Facebook parent company Meta recently took down 1,000 URLs with malware targeting businesses’ social media accounts.
Browser Based-Threat Alert: Bumblebee Malware Campaign – When Malicious Ads Meet Compromised Websites
Threat actors are using search ads and compromised websites to deliver malware disguised as legitimate software. Find out how ConcealBrowse can keep your users safe from this insidious attack.
Browser-Based Threat Report: ConcealBrowse Thwarts Sophisticated Spear Phishing Attack Targeting Conceal CEO
Conceal CEO Gordon Lawson was recently targeted by a sophisticated spear phishing attack that bypassed multiple security measures. Fortunately, ConcealBrowse detected the threat and ensured that Conceal - and our customers - remained safe.
Browser-Based Threat Report: The Tax Day Tangle – Cybercriminals’ Taking Advantage of Stressful Season to Deliver Malware
As the April 18 tax deadline approaches, cybercriminals are taking advantage of this time-sensitive and stressful period to launch a targeted phishing campaign with the goal of gaining unauthorized access to sensitive personal information.
Tech Spotlight: ConcealBrowse Dashboard – Enhancing Visibility and Security Control
In today’s digital landscape, organizations are continuously exposed to threats that bypass other security controls. ConcealBrowse offers a comprehensive solution that provides protection against malicious activity undetected by conventional security measures. Additionally, the corresponding dashboard provides enhanced visibility and insights into activities that may go unnoticed by other tools. In this tech spotlight blog, we’ll explore the features of the ConcealBrowse Dashboard and discuss how it can help organizations improve their security posture.
Browser-Based Threat Alert: Increased Phishing Attacks on Collaboration Platforms Highlight the Importance of Zero-Trust Browser Protection
The threat of phishing attacks is only growing in the era of hybrid work and digital collaboration. Cybercriminals are increasingly targeting collaboration platforms such as Slack and Microsoft Teams. Companies are grappling with a growing threat surface, and many feel vulnerable to attacks delivered through their collaboration tools. To protect against these evolving threats, businesses must adopt zero-trust web browser protection tools like ConcealBrowse.
The Growing Impact of Cybersecurity on Credit Ratings: What Companies Need to Know
Credit rating agencies are increasingly looking at a company's cybersecurity posture when determining credit ratings. Companies that have suffered major cybersecurity incidents are now more likely to see their credit ratings downgraded. Read on to find out how companies can improve their financial health in tandem with their security posture.
Browser-Based Threat Alert: SVB Opportunistic Phishing Attacks
The collapse of Silicon Valley Bank (SVB) and subsequent phishing attacks targeting its customers offer a cautionary tale and highlight the importance of zero-trust protection measures.
How to Increase Your Profitability as an MSP
We know that as a managed service provider, increased profitability is critical to growth and success in the industry. As an MSP, having the right strategic partner allows you to expand your services while streamlining effective operations and investing in services that result in recurring revenue. At Conceal, we're invested in helping you implement a strategy that includes maximizing profitability.
Conceal Threat Alert: Phishing Attack Bypasses Traditional Controls, ConcealBrowse to the Rescue
Attackers continue to innovate in their efforts to bypass traditional security controls and deliver credential theft links to unsuspecting users. In an environment rich with information about how security controls work and what entices users to click, there is a distinct need for improved protection in the browser.
Browser-Based Threat Alert: Iranian Government Actors Mimic Think Tank for Targeted Phishing Attacks
Researchers recently discovered sophisticated and well-targeted phishing attacks against researchers documenting suppression of Iranian minority groups. The actors, likely affiliated with the Iranian government, mounted extensive, long-term social engineering operations to gain the victims’ trust and steal their information.
4 Secrets MSPs Should Know About Browser Security
As an MSP, it is your mission to provide your customers with tailored technology solutions and services that meet their specific needs and help them reach their business goals. Implementing security measures is an essential part of this, as it reduces the risk of cyber incidents. But what if implementing security measures not only increased the organization's security posture but also saved you time and money? By investing in a comprehensive browser security tool, you can go beyond just protecting the edge.
Conceal Threat Alert: Phishing Attack Threatens Physical Security of Homes
As smart home features become more common, cyber attacks can present real physical threats to users. A new report highlights a phishing attack designed to bypass email-based security measures that could result in attackers having access to a users’ home as well as their bank accounts.
Conceal Threat Alert: Hackers Mimicking ChatGPT to Spread Malware
A new malware, the ChatGPT Stealer, is targeting users of the AI-powered chatbot, ChatGPT, and stealing personal information from the infected user's device. The attackers used the trusted reputation of ChatGPT to convince users to download a credential-stealing trojan that pretended to be a ChatGPT app.
Why ConcealBrowse?
As the internet becomes an ever-growing part of our daily lives, with 65% of the population projected to be using it by 2023, cyber risks initiated in the browser are growing exponentially. To protect ourselves from these threats, we need browser extensions that focus on security and privacy. To address these issues, browser extensions such as ConcealBrowse are gaining traction. Taking a deep dive into browser security, we explore how ConcealBrowse works and its top 4 benefits.
Conceal Threat Alert: Coinbase Employee Compromised via SMS Phishing Attack
A recent cyberattack on cryptocurrency exchange Coinbase highlights the growing threat facing organizations. The attack was carried out by sending fake SMS messages that appeared to be from the company’s security team. However, these messages included malicious links that redirected employees to a phishing website, allowing attackers to take control of their accounts and access sensitive data.
Browser-Based Threat Alert: ChatGPT May Be Causing More Harm Than Good
ChatGPT is a machine model that appears to be ethical but can be used for malicious purposes such as writing phishing emails and malicious code. It has proven to be capable of writing "fairly decent malware” and can be used for a variety of nefarious activities, including spam, espionage, and ransomware. To protect against these threats, organizations must take proactive steps to ensure browser security is an integral part of their cybersecurity strategy.
Conceal Threat Alert: Attackers Behind “Screenshotter” Malware Hit Tens of Thousands of Targets in US and Germany
Proofpoint recently reported on a new threat actor referred to as TA886, targeting organizations in the US and Germany via custom malware called "Screenshotter." The malware was accessed via URLs sent to tens of thousands of email addresses, resulting in network compromises, data loss, and credential theft.
Customer Testimonial: The Power of ConcealBrowse – Protecting Organizations When Trusted Sites are Compromised
A Conceal customer recently reported a successful instance of ConcealBrowse protecting their employees from a malicious partner website. An employee of the company attempted to access a partner site, only to find that attackers had replaced a link they used regularly with one that would lead them to a harmful website. ConcealBrowse immediately identified this link as malicious, and it was isolated to prevent it from affecting the customer's network.
Phishing Attacks Evade Traditional Security Defenses
It’s no question that phishing attacks are evolving; threat actors are increasing in sophistication and their ability to bypass traditional security defenses. Traditional security training is no longer enough to protect your organization – it’s time for a new approach. To defend against phishing attacks in 2023, each email link clicked, and every URL visited, needs to be filtered on an instance-by-instance basis. To minimize the success of social engineering attacks, the zero-trust model is crucial.
Conceal Threat Alert: Reddit Internal Systems Compromised by Targeted Phishing Attack
Reddit faced a security incident that resulted from a sophisticated, highly-targeted phishing attack against its employees. Conceal’s browser-based phishing protection extension, ConcealBrowse could have helped prevent the attack by adding an extra layer of security to the browsing experience and preventing users from entering their credentials into malicious web sites.
Making the Most Out of 2023 Cyber Budgets
A recent study released by Neustar International Security Council found that only half of the responding companies have sufficient budgets to address their cybersecurity needs. Organizations need to think outside the box when developing their 2023 roadmap to maximize security with their constrained budgets. Introducing ConcealBrowse, an affordable secure browser solution that can help organizations maximize their investment in security, at the edge.
Conceal Threat Alert: Data Breach at MailChimp
A data breach at Mailchimp provided vital information to cyber criminals that could enable them to create highly targeted and especially effective phishing attacks against FanDuel customers. Read about the attack, and how ConcealBrowse’s anti-phishing protection can protect your company from these types of attacks.
Traditional Endpoint Protection Platforms Are No Longer Sufficient
With the growing sophistication of threat actors, endpoint protection solutions need to transform their approach to maximize value for their customers.
Conceal Threat Alert: Government Employees Money Stolen through Targeted Phishing Campaign
In October 2022, CISA identified a widespread cyber campaign involving the malicious use of legitimate remote monitoring and management (RMM) software. Criminal actors sent phishing emails that led to the download of legitimate RMM software which the actors used in a refund scam to steal money from victim bank accounts. The actors used the software to steal banking credentials from government employees.
Conceal Threat Alert: Re-used Passwords Result in Breach of 35,000 PayPal Accounts
35,000 PayPal accounts were recently breached, resulting in the theft of personal information including Social Security numbers and contact information. While this was the culmination of what was likely a series of complex attacks, better security in the browser with advanced phishing protection and malware protection could have stopped it before it started.
Conceal Threat Alert: Chinese Threat Actor Targets Users in WhatsApp
A prolific Chinese threat actor is abusing people’s trust of brands to distribute malware and conduct fraud on a massive scale. The actor sends malicious links via WhatsApp, highlighting the growing threat of malicious links delivered via applications outside of email, where many anti-phishing protection measures are focused.
It’s 2023 and We Are Still Worried About Ransomware
Ransomware continues to cripple organizations and countries, but why? The answer is simple - there is a gap in tooling. Many organizations continue to invest in tooling to address ransomware-related objectives. Despite the investments being made, the tooling doesn't solve for ransomware's biggest challenges. 85% of ransomware attacks originate with phishing attacks on end users, and the method has evolved exponentially. While there are growing vectors for phishing, one thing remains constant - the browser is a critical gateway for all attack types.
Conceal Threat Alert: Despite Boosted Funding and Attention, 2022 Saw No Improvement in Government Ransomware Defense
Despite new legislation and skyrocketing cyber security spending, government, health, and educational institutions saw no reduction in the number of successful ransomware attacks in 2022. These attacks have resulted in massive ransom payments that make it more difficult for these organizations to carry out their missions, and have even resulted in direct physical harm in medical settings. How can organizations fight back?
Don’t Blame the User for Clicking on Links
It can be difficult for even the most well-trained users to spot malicious links. No amount of cyber security training can negate the fact that clicking links is something everyone has to do dozens or hundreds of times per day as part of their job. Find out how to remove from your employees the burden of keeping your company secure.
Conceal Threat Alert: Attackers Using Search Engine Ads to Beat Antiphishing Software.
The FBI recently made an announcement concerning the use of web search advertising combined with classic phishing techniques to trick users into downloading ransomware or providing their credentials to cyber criminals. Find out more about this threat and how Conceal can prevent you from becoming a victim.
Conceal Threat Alert: New Malware Families
Several new ransomware variants hit the Internet in 2022. Find out more about three of the most common ones, and see how ConcealBrowse can help provide ransomware protection against some of the most common delivery methods with dynamic next-generation remote browsing isolation and phishing protection built in.
Browser-Based Threat Alert: Russian Campaign
A likely Russian advanced persistent threat actor has been utilizing phishing campaigns to steal credentials of Western military and strategic research targets. This attack uses an interesting social engineering trick as to circumvent common phishing protection tools. Find out how Conceal’s Internet browsing security solution incorporating dynamic remote browser isolation can help prevent similar attacks.
Browser-Based Threat Alert: Disneyland Malware Team
Recently, Krebs on Security reported on a financial crime group called the "Disneyland Team" that uses an uncommon phishing technique. This method makes use of a little-known feature built into most web browsers to render domain names with non-Latin characters. Called Punycode, the feature takes a URL that contains special character strings and renders them using non-Latin characters. These are the types of user trust attacks that ConcealBrowse defeats. To identify and block these attacks, ConcealBrowse relies on advanced phishing identification and an intelligence-fed decision engine instead of allowing users to make decisions based on their own trust and ability to spot suspicious sites.
What’s the best browser security solution? One that ignores users’ trust.
Implementing zero-trust principles across your network and throughout your organization is an expensive and time-consuming process. In fact, recent research shows that while 91% of companies are aware of or want to deploy zero-trust security measures, only 12% are fully deployed. With an increasing amount of work happening in the browser, both on and off your network, you need the best browser security solution to push zero-trust to the edge quickly and affordably. That's where ConcealBrowse comes in with smart, dynamic remote browser isolation and phishing protection built in.
Conceal Threat Alert: Aurora Malware as a Service Targets Crypto Wallets & Credentials
Sekoia, a cybersecurity solution provider, reported a recently discovered piece of malware dubbed “Aurora” by its developer. According to the report, Aurora is advertised as a malware-as-a-service that can be hired to steal credentials for cryptocurrency wallets and criminal groups wasted no time in developing engineering and phishing approaches to distribute the malware. Fortunately, ConcealBrowse ensures that no matter how good a social engineering technique is, a user’s actions cannot result in a successful attack on your organization's network. Read more in our latest blog to find out how ConcealBrowse can keep your organization safe from phishing, ransomware, and all other types of malware delivered through the browser.
Conceal Threat Alert: Instagram Users Targeted in Phishing Attack
Armorblox recently identified a credential theft phishing attack targeting over 20,000 Instagram users at a national institution within the Education Industry. The attack leveraged several common techniques to convince users that the email and linked login page were legitimately associated with Instagram. Fortunately, ConcealBrowse’s simple plug-and-play secure browser extension can stop these attacks by blocking phishing sites before they are even opened. Read more in our latest blog!
Browser-Based Threat Alert: BATLOADER
A recent report by Mandiant shows the discovery of a new piece of malware they called “BATLOADER”. The malware is delivered via malicious websites that are disguised as download sites for legitimate consumer software. Unlike some malware that takes advantage of zero-day vulnerabilities to compromise a system without user interaction, BATLOADER requires the user to download and execute the malicious file. Fortunately, ConcealBrowse protects against this attack by making decisions about what to load and how to load it based on facts and data, not on trust. Read more in our recent blog to see how ConcealBrowse can stop these attacks and prevent malware from ever entering your organization's network.
Conceal Threat Alert: Phishing Incident Targeting Dropbox
Dropbox reported they were recently the target of a phishing campaign that gave the attackers access to the company’s source code for internal prototypes, as well as some of the tools used by their security team. Check out our latest blog to learn how ConcealBrowse could have prevented this attack.
WWCD: Staying One Step Ahead of the Attack
With browser zero days being discovered all the time – and frequently not until they’ve already been exploited – how can companies protect themselves during the period between the initial exploitation and when they are able to install the latest browser update? Check out our latest blog to learn what Conceal would do.
#BeCyberSmart – Let’s Talk About Phishing
Let’s talk about phishing. Phishing is the top action variety in social engineering breaches, causing over 60% according to Verizon’s Data Breach Investigation report for 2022. Since 2016, phishing has seen an exponential increase in both the email click and do not click rates. This week, the National Cybersecurity Alliance has talked a lot about recognizing and reporting phishing and discussed.
WWCD: Defending Against Browser App Mode Abuse
Bill Toulas at Bleeping Computer recently highlighted a new phishing technique in the wild that is designed to abuse user’s increased likelihood of trusting applications that appear to be desktop applications over those that appear inside a web browser. So what would Conceal do? Read our latest blog to find out.
WWCD: How can ConcealBrowse stop abuse of trust?
We all know from experience that regardless of how much training users receive, they far to often let down their guard when they believe they are interacting with a trusted party. Fortunately, Conceal takes over the task of distrusting everything and isolating malicious activity regardless of the user’s perception of safety. Read our latest blog to learn more.
Welcome to National Cybersecurity Awareness Month!
We are thrilled to announce that we are an official champion of National Cybersecurity Awareness Month (NCSAM)! What is NCSAM you ask? It’s only the best month of the year for the cybersecurity community! NCSAM started 19 years ago as a partnership between the National Cybersecurity Alliance (NCA) and the U.S. Department of Homeland Security (DHS).
WWCD: Could Conceal Have Stopped Lapsus$?
Several multinational companies have been in the news in recent months thanks to being victims of the prolific data extortion group known as Lapsus$. The most recent victims are Uber and Grand Theft Auto videogame producer Rockstar Games. However, Lapsus$ has been in the news for a majority of 2022 with successful attacks on Okta, Microsoft, Samsung, and others. Could these attacks have been prevented?
Are You Ready for Mandatory Cybersecurity Disclosure?
Vulnerability exploitation will continue to be a key entry point into your organization’s network. As a result, security teams must explore proactive security measures and tools that can be leveraged to minimize threat actors’ ability to take advantage of a vulnerability. Conceal provides part of the necessary proactive security measures by stopping malware before it has a chance to exploit unpatched vulnerabilities.
“CONCEALing” Browser Context Through our Patented SDN
Threat actors can't attack you if they can't find you. With an additional layer of protection, you can make it much more difficult for attackers to trace web activity back to your organization or to find cloud applications and infrastructure that are critical to your business. This protection is what we call the 'privacy fabric'.
4 Key Information Security Threats of 2022
Vulnerability exploitation will continue to be a key entry point into your organization’s network. As a result, security teams must explore proactive security measures and tools that can be leveraged to minimize threat actors’ ability to take advantage of a vulnerability. Conceal provides part of the necessary proactive security measures by stopping malware before it has a chance to exploit unpatched vulnerabilities.
Now All Together
A 2020 research paper by cybersecurity think tank USENIX highlights a key problem with cyber intelligence data: Even though commercial threat data is expensive, it paints an incomplete picture of the risk to your company.
Change Maker | Building a Culture and Protecting our Online Presence
Conceal colleagues, Gordon Lawson, CEO and Ivie Teston, Inside Sales Manager sat down recently with Deke Copenhaver, host of The Changemaker podcast series to talk about establishing a welcoming work culture, what it takes to engage a young workforce, and how our online presence might not be as safe as you think.
Searching the Internet Safely and Anonymously
Everyone has seen the famous The New Yorker cartoon (July 5, 1993) where a dog behind a computer informs a canine friend sitting nearby that “On the Internet, nobody knows you’re a dog.” There’s only one problem with this memorable phrase. It’s not true anymore.
Protection Through Isolation
Security professionals are well aware that sending an email to a colleague has always been the digital equivalent of sending a postcard. Now, given the aggressiveness and skill of today’s hackers, the situation with data on the internet is hardly much better. If your file storage has a public IP address, your data is vulnerable to attack.
If Malware Gets into your Network, It’s Too Late!
Security organizations face a disturbing escalation in the number of threats – up 31% in 2021. Even more important, though, is their increasing variety and sophistication. The ConcealBrowse system uses a new tactic: isolation.
How ConcealBrowse Helps MSPs and MSSPs Expand Services and Increase Revenue
As an MSP or MSSP, your primary responsibility is to deliver top-notch security solutions to your clients while driving revenue and operational efficiency. The growing demand for cybersecurity solutions and the increasing sophistication of cyber threats make this task even more challenging. We are here to alleviate these challenges at the edge. Enter ConcealBrowse, an AI-powered browser security solution designed to enhance your service offerings and expand your business.
How ConcealBrowse Helps SOC Professionals Minimize Alerts and Improve Response Times
As a SOC professional, your role involves managing a high volume of security alerts and ensuring timely responses to potential threats. The rise of remote work and the increasing sophistication of cyber attacks have made this task even more challenging. But, we are here to help alleviate these challenges at the edge. Enter ConcealBrowse, an AI-powered browser security solution designed to simplify your workload and enhance SOC efficiency.
How ConcealBrowse Enhances Network Security and Proactive Threat Mitigation
As a network security professional, your role involves protecting your organization’s network from a myriad of cyber threats. The rise of remote work and the increasing sophistication of cyber attacks have made this task even more challenging. But, we have a solution to help address these challenges. Enter ConcealBrowse, an AI-powered browser security solution designed to simplify your workload and enhance network security.
How ConcealBrowse Helps CTOs Drive Innovation and Ensure Security
As a CTO, your primary responsibility is to drive technological innovation while maintaining robust security measures. The rise of remote work and increasing cyber threats have made this task even more challenging. But, we have a solution to help you overcome this challenge. Enter ConcealBrowse, an AI-powered browser security solution designed to simplify your workload and enhance security.
How ConcealBrowse Helps CIOs Streamline IT Management and Boost Security
As a CIO, you are tasked with optimizing technology to support business objectives while managing a complex IT landscape. The rise of remote work and increasing cyber threats have made this task even more challenging. Enter ConcealBrowse, an AI-powered browser security solution designed to simplify your workload and enhance IT efficiency.
How ConcealBrowse Helps CISOs Mitigate Risks and Enhance Security
As a CISO, you are constantly faced with the challenge of protecting your organization’s sensitive data while managing a complex security landscape. The rise of remote work and the increasing sophistication of cyber threats have made this task even more daunting. Enter ConcealBrowse, an AI-powered browser security solution designed to simplify your workload and enhance your browser security posture.
Securing Our Future: The Critical Role of Cybersecurity in U.S. Educational Institutions
As buds bloom and the air fills with the promise of spring, the continuous cycle of learning and education presses on. Yet, in our digitally interconnected era, this journey faces unprecedented challenges, notably in cybersecurity.
What is a ‘Browser in the Browser’ Phishing Attack?
Among the wide variety of browser threats organizations are having to deal with in 2024 is the 'Browser in the Browser' (BitB) phishing attack. This emergence poses a significant challenge to browser security. This blog post delves into the mechanics of BitB attacks, offering insights into how they work and tips on protecting yourself from falling victim.
Beyond Antivirus Software: The Case for Dedicated Browser Security
Antivirus software is the cornerstone of cybersecurity strategies for individuals and organizations alike. Yet, as cyber threats have evolved, the limitations of traditional antivirus solutions in protecting users during web browsing have become increasingly apparent.
Navigating the Waters of Phishing Attacks with Advanced Browser Security
In an era where digital threats loom at every corner, phishing attacks stand out for their oftentimes cunning simplicity yet devastating effectiveness. These deceptive tactics aim to steal personal and financial information by masquerading as trustworthy entities. As these threats evolve in sophistication, the need for robust browser security becomes not just advisable but essential for secure web browsing.
Can DNS Protect Against Browser Malware?
Amidst the myriad of technologies safeguarding our online interactions, DNS servers emerge as crucial yet often overlooked guardians. These servers act as the internet's phonebook, translating domain names into IP addresses. Their role is critical not just for connectivity but also for maintaining the security of our web browsing experiences.
Navigating the Web Safely: Understanding Social Engineering and Browser Security
In the vast and interconnected world of the internet, our reliance on browsers to explore, work, and socialize is undeniable. However, this convenience comes with its share of risks, especially from social engineering attacks that exploit human psychology rather than technological vulnerabilities. Understanding social engineering and its implications for browser security is crucial for secure web browsing.
The Crucial Role of Web Pages in Browser Security: A Deep Dive into AI-Powered Solutions
In today’s digital age, where the internet has become an indispensable part of daily life, the security of web pages we visit has never been more critical. With cyber threats lurking behind seemingly innocuous links, the need for comprehensive browser security measures, including the use of AI-Powered Browser Security extensions, has skyrocketed.
The Human Element in Cybersecurity: Our Greatest Strength and Vulnerability
In the ever-evolving cybersecurity landscape, the conversation frequently orbits around technological advancements, encryption protocols, and cutting-edge security tools. However, the most critical component in the cybersecurity equation remains the human element.
Explaining The AI-Powered Browser Security Extension for Secure Web Browsing
In the vast expanse of the internet, where digital threats loom at every corner, securing your online experience has become paramount. Enter Conceal, the cutting-edge AI-Powered Browser Security extension designed to redefine secure web browsing.
Enhancing User Experience Through AI-Powered Browser Security
In the digital age, secure web browsing is not just a preference; it's a necessity. With cyber threats evolving at an alarming rate, particularly in the form of sophisticated phishing attacks, the demand for robust browser security measures has never been higher.
The Human Element in Cybersecurity: A Frontline Perspective
In today’s rapidly evolving digital landscape, where technology seems to outpace security measures at every turn, the human element of cybersecurity remains both its most vulnerable point and its strongest asset.
Fortifying the Frontlines: Transforming Cybersecurity in the Age of Sophisticated Phishing and Social Engineering
In the digital age, where connectivity and convenience are prized above all, the threats lurking in the shadows of our online world have become more sophisticated and insidious. Phishing and social engineering represent the cutting edge of cybercrime, continually evolving to outmaneuver even the most vigilant of defenses.
The Rise of Browser-Based Phishing Attacks and Expectations for 2024
There has been a 198% increase in browser-based phishing attacks, emphasizing the need for enterprise browser security solutions.
Conceal’s Year in Review: Innovations, Challenges, and Successes
As we bid farewell to another eventful year, it’s time to reflect on the milestones, challenges, and triumphs that have shaped Conceal over the past twelve months.
Navigating the Cyber Seas with Conceal’s AI Engine: A Deep Dive into AI-Powered Browser Security
Following our exploration of the vital role of Artificial Intelligence (AI) in browser security strategies, it's time to delve into a specific, cutting-edge solution: ConcealBrowse's AI engine.
Embracing the Future: The Crucial Role of Artificial Intelligence in Browser Security Strategies
We all have heard that traditional security measures are no longer sufficient in the ever-evolving landscape of cyber threats.
ConcealBrowse Analysis: Mitigating Emerging Cyber Threats in the Tech Industry
A forward-thinking technology company recognizing the evolving nature of cyber threats, strategically integrated ConcealBrowse into its cybersecurity framework. This move proved its worth when ConcealBrowse successfully isolated a high-risk domain, mograppido[.]com, that posed a significant threat to the company's network.
ConcealBrowse Analysis: Thwarting Advanced Cyber Threats in the Chemical Industry
Facing an ever-increasing cyber threat landscape, an integrated chemical and equipment company recognized the need for enhanced cybersecurity measures and strategically invested in ConcealBrowse.
ConcealBrowse Analysis: The Hidden Risks of Shared Hosting
In the intricate cybersecurity landscape, where threats evolve daily, tools like ConcealBrowse provide a much-needed safety net. A recent threat analysis for a hedge fund highlighted how ConcealBrowse's smart decision engine leverages its "proximity" metric to identify potential threats, even when not directly implicated as malicious.
The “Non-Subscribe” Attack: How ConcealBrowse Shields the Human Layer
It's no longer a surprise that the cyber threat landscape is continuously evolving, and cybercriminals are relentlessly innovating ways to infiltrate and exploit unsuspecting users. The most recent deceptive method brought to our attention is the "Non-Subscribe" attack.
Introducing ConcealBrowse for Firefox Users!
As we continue to expand our solution here at Conceal to best fit our customer needs, we are pleased to announce that ConcealBrowse is now available for Firefox!
ConcealBrowse: A Communications Company’s First Line of Defense
In an era where every click could lead to a potential security breach, a prominent communications company took a proactive approach. Recognizing the ever-growing spectrum of cyber threats, the company invested in ConcealBrowse. This cybersecurity solution would soon prove its worth in an unexpected way.
ConcealBrowse: Shielding IT Solutions from Stealthy Threats
In the rapidly evolving landscape of IT, staying ahead of threats is paramount. This imperative led to the adoption of ConcealBrowse, an advanced cybersecurity tool. For one IT solution in particular, this investment turned out to be not just prudent but crucial.
ConcealBrowse: Successfully Isolating a Threat Beyond Edge Controls
Cybersecurity has become a vital component of any organization's technological infrastructure, especially given the escalating threats in the digital sphere. Recently, a tech company made a strategic decision to invest in ConcealBrowse, which proved instrumental when a threat evaded the firm's existing proactive edge controls.
ConcealBrowse: A Frontline Defense in Isolating a Threat That Outsmarted Edge Controls
As cyber threats become increasingly sophisticated, the need for advanced protective measures grows more urgent. Recognizing this, a forward-thinking state government organization recently invested in our cybersecurity solution: ConcealBrowse. This advanced tool proved crucial when a subtle threat slipped past all the organization's other proactive controls at the edge.
Browser-Based Threat Alert: Meta Highlights Threats Against Business Accounts on its Social Platforms
Cyberattacks targeting personal accounts connected to business pages on social media platforms can result in unauthorized ads, financial losses, and significant damage to brand reputation. Facebook parent company Meta recently took down 1,000 URLs with malware targeting businesses’ social media accounts.
Browser Based-Threat Alert: Bumblebee Malware Campaign – When Malicious Ads Meet Compromised Websites
Threat actors are using search ads and compromised websites to deliver malware disguised as legitimate software. Find out how ConcealBrowse can keep your users safe from this insidious attack.
Browser-Based Threat Report: ConcealBrowse Thwarts Sophisticated Spear Phishing Attack Targeting Conceal CEO
Conceal CEO Gordon Lawson was recently targeted by a sophisticated spear phishing attack that bypassed multiple security measures. Fortunately, ConcealBrowse detected the threat and ensured that Conceal - and our customers - remained safe.
Browser-Based Threat Report: The Tax Day Tangle – Cybercriminals’ Taking Advantage of Stressful Season to Deliver Malware
As the April 18 tax deadline approaches, cybercriminals are taking advantage of this time-sensitive and stressful period to launch a targeted phishing campaign with the goal of gaining unauthorized access to sensitive personal information.
Tech Spotlight: ConcealBrowse Dashboard – Enhancing Visibility and Security Control
In today’s digital landscape, organizations are continuously exposed to threats that bypass other security controls. ConcealBrowse offers a comprehensive solution that provides protection against malicious activity undetected by conventional security measures. Additionally, the corresponding dashboard provides enhanced visibility and insights into activities that may go unnoticed by other tools. In this tech spotlight blog, we’ll explore the features of the ConcealBrowse Dashboard and discuss how it can help organizations improve their security posture.
Browser-Based Threat Alert: Increased Phishing Attacks on Collaboration Platforms Highlight the Importance of Zero-Trust Browser Protection
The threat of phishing attacks is only growing in the era of hybrid work and digital collaboration. Cybercriminals are increasingly targeting collaboration platforms such as Slack and Microsoft Teams. Companies are grappling with a growing threat surface, and many feel vulnerable to attacks delivered through their collaboration tools. To protect against these evolving threats, businesses must adopt zero-trust web browser protection tools like ConcealBrowse.
The Growing Impact of Cybersecurity on Credit Ratings: What Companies Need to Know
Credit rating agencies are increasingly looking at a company's cybersecurity posture when determining credit ratings. Companies that have suffered major cybersecurity incidents are now more likely to see their credit ratings downgraded. Read on to find out how companies can improve their financial health in tandem with their security posture.
Browser-Based Threat Alert: SVB Opportunistic Phishing Attacks
The collapse of Silicon Valley Bank (SVB) and subsequent phishing attacks targeting its customers offer a cautionary tale and highlight the importance of zero-trust protection measures.
How to Increase Your Profitability as an MSP
We know that as a managed service provider, increased profitability is critical to growth and success in the industry. As an MSP, having the right strategic partner allows you to expand your services while streamlining effective operations and investing in services that result in recurring revenue. At Conceal, we're invested in helping you implement a strategy that includes maximizing profitability.
Conceal Threat Alert: Phishing Attack Bypasses Traditional Controls, ConcealBrowse to the Rescue
Attackers continue to innovate in their efforts to bypass traditional security controls and deliver credential theft links to unsuspecting users. In an environment rich with information about how security controls work and what entices users to click, there is a distinct need for improved protection in the browser.
Browser-Based Threat Alert: Iranian Government Actors Mimic Think Tank for Targeted Phishing Attacks
Researchers recently discovered sophisticated and well-targeted phishing attacks against researchers documenting suppression of Iranian minority groups. The actors, likely affiliated with the Iranian government, mounted extensive, long-term social engineering operations to gain the victims’ trust and steal their information.
4 Secrets MSPs Should Know About Browser Security
As an MSP, it is your mission to provide your customers with tailored technology solutions and services that meet their specific needs and help them reach their business goals. Implementing security measures is an essential part of this, as it reduces the risk of cyber incidents. But what if implementing security measures not only increased the organization's security posture but also saved you time and money? By investing in a comprehensive browser security tool, you can go beyond just protecting the edge.
Conceal Threat Alert: Phishing Attack Threatens Physical Security of Homes
As smart home features become more common, cyber attacks can present real physical threats to users. A new report highlights a phishing attack designed to bypass email-based security measures that could result in attackers having access to a users’ home as well as their bank accounts.
Conceal Threat Alert: Hackers Mimicking ChatGPT to Spread Malware
A new malware, the ChatGPT Stealer, is targeting users of the AI-powered chatbot, ChatGPT, and stealing personal information from the infected user's device. The attackers used the trusted reputation of ChatGPT to convince users to download a credential-stealing trojan that pretended to be a ChatGPT app.
Why ConcealBrowse?
As the internet becomes an ever-growing part of our daily lives, with 65% of the population projected to be using it by 2023, cyber risks initiated in the browser are growing exponentially. To protect ourselves from these threats, we need browser extensions that focus on security and privacy. To address these issues, browser extensions such as ConcealBrowse are gaining traction. Taking a deep dive into browser security, we explore how ConcealBrowse works and its top 4 benefits.
Conceal Threat Alert: Coinbase Employee Compromised via SMS Phishing Attack
A recent cyberattack on cryptocurrency exchange Coinbase highlights the growing threat facing organizations. The attack was carried out by sending fake SMS messages that appeared to be from the company’s security team. However, these messages included malicious links that redirected employees to a phishing website, allowing attackers to take control of their accounts and access sensitive data.
Browser-Based Threat Alert: ChatGPT May Be Causing More Harm Than Good
ChatGPT is a machine model that appears to be ethical but can be used for malicious purposes such as writing phishing emails and malicious code. It has proven to be capable of writing "fairly decent malware” and can be used for a variety of nefarious activities, including spam, espionage, and ransomware. To protect against these threats, organizations must take proactive steps to ensure browser security is an integral part of their cybersecurity strategy.
Conceal Threat Alert: Attackers Behind “Screenshotter” Malware Hit Tens of Thousands of Targets in US and Germany
Proofpoint recently reported on a new threat actor referred to as TA886, targeting organizations in the US and Germany via custom malware called "Screenshotter." The malware was accessed via URLs sent to tens of thousands of email addresses, resulting in network compromises, data loss, and credential theft.
Customer Testimonial: The Power of ConcealBrowse – Protecting Organizations When Trusted Sites are Compromised
A Conceal customer recently reported a successful instance of ConcealBrowse protecting their employees from a malicious partner website. An employee of the company attempted to access a partner site, only to find that attackers had replaced a link they used regularly with one that would lead them to a harmful website. ConcealBrowse immediately identified this link as malicious, and it was isolated to prevent it from affecting the customer's network.
Phishing Attacks Evade Traditional Security Defenses
It’s no question that phishing attacks are evolving; threat actors are increasing in sophistication and their ability to bypass traditional security defenses. Traditional security training is no longer enough to protect your organization – it’s time for a new approach. To defend against phishing attacks in 2023, each email link clicked, and every URL visited, needs to be filtered on an instance-by-instance basis. To minimize the success of social engineering attacks, the zero-trust model is crucial.
Conceal Threat Alert: Reddit Internal Systems Compromised by Targeted Phishing Attack
Reddit faced a security incident that resulted from a sophisticated, highly-targeted phishing attack against its employees. Conceal’s browser-based phishing protection extension, ConcealBrowse could have helped prevent the attack by adding an extra layer of security to the browsing experience and preventing users from entering their credentials into malicious web sites.
Making the Most Out of 2023 Cyber Budgets
A recent study released by Neustar International Security Council found that only half of the responding companies have sufficient budgets to address their cybersecurity needs. Organizations need to think outside the box when developing their 2023 roadmap to maximize security with their constrained budgets. Introducing ConcealBrowse, an affordable secure browser solution that can help organizations maximize their investment in security, at the edge.
Conceal Threat Alert: Data Breach at MailChimp
A data breach at Mailchimp provided vital information to cyber criminals that could enable them to create highly targeted and especially effective phishing attacks against FanDuel customers. Read about the attack, and how ConcealBrowse’s anti-phishing protection can protect your company from these types of attacks.
Traditional Endpoint Protection Platforms Are No Longer Sufficient
With the growing sophistication of threat actors, endpoint protection solutions need to transform their approach to maximize value for their customers.
Conceal Threat Alert: Government Employees Money Stolen through Targeted Phishing Campaign
In October 2022, CISA identified a widespread cyber campaign involving the malicious use of legitimate remote monitoring and management (RMM) software. Criminal actors sent phishing emails that led to the download of legitimate RMM software which the actors used in a refund scam to steal money from victim bank accounts. The actors used the software to steal banking credentials from government employees.
Conceal Threat Alert: Re-used Passwords Result in Breach of 35,000 PayPal Accounts
35,000 PayPal accounts were recently breached, resulting in the theft of personal information including Social Security numbers and contact information. While this was the culmination of what was likely a series of complex attacks, better security in the browser with advanced phishing protection and malware protection could have stopped it before it started.
Conceal Threat Alert: Chinese Threat Actor Targets Users in WhatsApp
A prolific Chinese threat actor is abusing people’s trust of brands to distribute malware and conduct fraud on a massive scale. The actor sends malicious links via WhatsApp, highlighting the growing threat of malicious links delivered via applications outside of email, where many anti-phishing protection measures are focused.
It’s 2023 and We Are Still Worried About Ransomware
Ransomware continues to cripple organizations and countries, but why? The answer is simple - there is a gap in tooling. Many organizations continue to invest in tooling to address ransomware-related objectives. Despite the investments being made, the tooling doesn't solve for ransomware's biggest challenges. 85% of ransomware attacks originate with phishing attacks on end users, and the method has evolved exponentially. While there are growing vectors for phishing, one thing remains constant - the browser is a critical gateway for all attack types.
Conceal Threat Alert: Despite Boosted Funding and Attention, 2022 Saw No Improvement in Government Ransomware Defense
Despite new legislation and skyrocketing cyber security spending, government, health, and educational institutions saw no reduction in the number of successful ransomware attacks in 2022. These attacks have resulted in massive ransom payments that make it more difficult for these organizations to carry out their missions, and have even resulted in direct physical harm in medical settings. How can organizations fight back?
Don’t Blame the User for Clicking on Links
It can be difficult for even the most well-trained users to spot malicious links. No amount of cyber security training can negate the fact that clicking links is something everyone has to do dozens or hundreds of times per day as part of their job. Find out how to remove from your employees the burden of keeping your company secure.
Conceal Threat Alert: Attackers Using Search Engine Ads to Beat Antiphishing Software.
The FBI recently made an announcement concerning the use of web search advertising combined with classic phishing techniques to trick users into downloading ransomware or providing their credentials to cyber criminals. Find out more about this threat and how Conceal can prevent you from becoming a victim.
Conceal Threat Alert: New Malware Families
Several new ransomware variants hit the Internet in 2022. Find out more about three of the most common ones, and see how ConcealBrowse can help provide ransomware protection against some of the most common delivery methods with dynamic next-generation remote browsing isolation and phishing protection built in.
Browser-Based Threat Alert: Russian Campaign
A likely Russian advanced persistent threat actor has been utilizing phishing campaigns to steal credentials of Western military and strategic research targets. This attack uses an interesting social engineering trick as to circumvent common phishing protection tools. Find out how Conceal’s Internet browsing security solution incorporating dynamic remote browser isolation can help prevent similar attacks.
Browser-Based Threat Alert: Disneyland Malware Team
Recently, Krebs on Security reported on a financial crime group called the "Disneyland Team" that uses an uncommon phishing technique. This method makes use of a little-known feature built into most web browsers to render domain names with non-Latin characters. Called Punycode, the feature takes a URL that contains special character strings and renders them using non-Latin characters. These are the types of user trust attacks that ConcealBrowse defeats. To identify and block these attacks, ConcealBrowse relies on advanced phishing identification and an intelligence-fed decision engine instead of allowing users to make decisions based on their own trust and ability to spot suspicious sites.
What’s the best browser security solution? One that ignores users’ trust.
Implementing zero-trust principles across your network and throughout your organization is an expensive and time-consuming process. In fact, recent research shows that while 91% of companies are aware of or want to deploy zero-trust security measures, only 12% are fully deployed. With an increasing amount of work happening in the browser, both on and off your network, you need the best browser security solution to push zero-trust to the edge quickly and affordably. That's where ConcealBrowse comes in with smart, dynamic remote browser isolation and phishing protection built in.
Conceal Threat Alert: Aurora Malware as a Service Targets Crypto Wallets & Credentials
Sekoia, a cybersecurity solution provider, reported a recently discovered piece of malware dubbed “Aurora” by its developer. According to the report, Aurora is advertised as a malware-as-a-service that can be hired to steal credentials for cryptocurrency wallets and criminal groups wasted no time in developing engineering and phishing approaches to distribute the malware. Fortunately, ConcealBrowse ensures that no matter how good a social engineering technique is, a user’s actions cannot result in a successful attack on your organization's network. Read more in our latest blog to find out how ConcealBrowse can keep your organization safe from phishing, ransomware, and all other types of malware delivered through the browser.
Conceal Threat Alert: Instagram Users Targeted in Phishing Attack
Armorblox recently identified a credential theft phishing attack targeting over 20,000 Instagram users at a national institution within the Education Industry. The attack leveraged several common techniques to convince users that the email and linked login page were legitimately associated with Instagram. Fortunately, ConcealBrowse’s simple plug-and-play secure browser extension can stop these attacks by blocking phishing sites before they are even opened. Read more in our latest blog!
Browser-Based Threat Alert: BATLOADER
A recent report by Mandiant shows the discovery of a new piece of malware they called “BATLOADER”. The malware is delivered via malicious websites that are disguised as download sites for legitimate consumer software. Unlike some malware that takes advantage of zero-day vulnerabilities to compromise a system without user interaction, BATLOADER requires the user to download and execute the malicious file. Fortunately, ConcealBrowse protects against this attack by making decisions about what to load and how to load it based on facts and data, not on trust. Read more in our recent blog to see how ConcealBrowse can stop these attacks and prevent malware from ever entering your organization's network.
Conceal Threat Alert: Phishing Incident Targeting Dropbox
Dropbox reported they were recently the target of a phishing campaign that gave the attackers access to the company’s source code for internal prototypes, as well as some of the tools used by their security team. Check out our latest blog to learn how ConcealBrowse could have prevented this attack.
WWCD: Staying One Step Ahead of the Attack
With browser zero days being discovered all the time – and frequently not until they’ve already been exploited – how can companies protect themselves during the period between the initial exploitation and when they are able to install the latest browser update? Check out our latest blog to learn what Conceal would do.
#BeCyberSmart – Let’s Talk About Phishing
Let’s talk about phishing. Phishing is the top action variety in social engineering breaches, causing over 60% according to Verizon’s Data Breach Investigation report for 2022. Since 2016, phishing has seen an exponential increase in both the email click and do not click rates. This week, the National Cybersecurity Alliance has talked a lot about recognizing and reporting phishing and discussed.
WWCD: Defending Against Browser App Mode Abuse
Bill Toulas at Bleeping Computer recently highlighted a new phishing technique in the wild that is designed to abuse user’s increased likelihood of trusting applications that appear to be desktop applications over those that appear inside a web browser. So what would Conceal do? Read our latest blog to find out.
WWCD: How can ConcealBrowse stop abuse of trust?
We all know from experience that regardless of how much training users receive, they far to often let down their guard when they believe they are interacting with a trusted party. Fortunately, Conceal takes over the task of distrusting everything and isolating malicious activity regardless of the user’s perception of safety. Read our latest blog to learn more.
Welcome to National Cybersecurity Awareness Month!
We are thrilled to announce that we are an official champion of National Cybersecurity Awareness Month (NCSAM)! What is NCSAM you ask? It’s only the best month of the year for the cybersecurity community! NCSAM started 19 years ago as a partnership between the National Cybersecurity Alliance (NCA) and the U.S. Department of Homeland Security (DHS).
WWCD: Could Conceal Have Stopped Lapsus$?
Several multinational companies have been in the news in recent months thanks to being victims of the prolific data extortion group known as Lapsus$. The most recent victims are Uber and Grand Theft Auto videogame producer Rockstar Games. However, Lapsus$ has been in the news for a majority of 2022 with successful attacks on Okta, Microsoft, Samsung, and others. Could these attacks have been prevented?
Are You Ready for Mandatory Cybersecurity Disclosure?
Vulnerability exploitation will continue to be a key entry point into your organization’s network. As a result, security teams must explore proactive security measures and tools that can be leveraged to minimize threat actors’ ability to take advantage of a vulnerability. Conceal provides part of the necessary proactive security measures by stopping malware before it has a chance to exploit unpatched vulnerabilities.
“CONCEALing” Browser Context Through our Patented SDN
Threat actors can't attack you if they can't find you. With an additional layer of protection, you can make it much more difficult for attackers to trace web activity back to your organization or to find cloud applications and infrastructure that are critical to your business. This protection is what we call the 'privacy fabric'.
4 Key Information Security Threats of 2022
Vulnerability exploitation will continue to be a key entry point into your organization’s network. As a result, security teams must explore proactive security measures and tools that can be leveraged to minimize threat actors’ ability to take advantage of a vulnerability. Conceal provides part of the necessary proactive security measures by stopping malware before it has a chance to exploit unpatched vulnerabilities.
Now All Together
A 2020 research paper by cybersecurity think tank USENIX highlights a key problem with cyber intelligence data: Even though commercial threat data is expensive, it paints an incomplete picture of the risk to your company.
Change Maker | Building a Culture and Protecting our Online Presence
Conceal colleagues, Gordon Lawson, CEO and Ivie Teston, Inside Sales Manager sat down recently with Deke Copenhaver, host of The Changemaker podcast series to talk about establishing a welcoming work culture, what it takes to engage a young workforce, and how our online presence might not be as safe as you think.
Searching the Internet Safely and Anonymously
Everyone has seen the famous The New Yorker cartoon (July 5, 1993) where a dog behind a computer informs a canine friend sitting nearby that “On the Internet, nobody knows you’re a dog.” There’s only one problem with this memorable phrase. It’s not true anymore.
Protection Through Isolation
Security professionals are well aware that sending an email to a colleague has always been the digital equivalent of sending a postcard. Now, given the aggressiveness and skill of today’s hackers, the situation with data on the internet is hardly much better. If your file storage has a public IP address, your data is vulnerable to attack.
If Malware Gets into your Network, It’s Too Late!
Security organizations face a disturbing escalation in the number of threats – up 31% in 2021. Even more important, though, is their increasing variety and sophistication. The ConcealBrowse system uses a new tactic: isolation.