Cloud Security Blog - Netskope

See what's going on in the cloud security service industry. We cover topics including cloud app security, cloud solutions, cloud vulnerabilities & more.

  • Cloud Malware Fan-out with Virlock Ransomware

    Cloud Malware Fan-out with Virlock Ransomware

    Introduction The ransomware landscape has dramatically grown since inception. Ransomware typically propagates via email, exploit kits, removable drives or external network shares. Ransomware...

    Read Article
  • Gartner Report: Market Guide for Cloud Access Security Brokers

    Get Your Copy
  • Analogies so bad, you had to duck . . .

    Analogies so bad, you had to duck . . .

    I was very recently in a friendly meeting in Washington DC with a Federal agency, and we were casually discussing how to stop cyber attacks aimed at their Internet gateway. Since the attendees...

    Read Article
  • What’s the Right Role for a CASB in the Cloud Encryption Value Chain?

    What’s the Right Role for a CASB in the Cloud Encryption Value Chain?

    Since Cloud Access Security Brokers (CASB) came onto the scene a few years ago, the industry has debated CASBs’ role in the cloud application encryption value chain. With more than 30 percent of...

    Read Article
  • Zepto Ransomware Variant of Locky Being Delivered Via DLL

    Zepto Ransomware Variant of Locky Being Delivered Via DLL

    Earlier this summer Netskope Threat Research Labs blogged about the Zepto variant of Locky Ransomware spreading via popular cloud apps. Since that first blog, we have continued to monitor the...

    Read Article
  • September 2016 Cloud Report: 43.7 Percent of Cloud Malware are Ransomware Delivery Vehicles

    September 2016 Cloud Report: 43.7 Percent of Cloud Malware are Ransomware Delivery Vehicles

    Today we released our quarterly Cloud Report – global as well as Europe, Middle East and Africa versions. In this quarter’s report, besides our usual cloud app usage numbers and cloud data loss...

    Read Article
  • Agents — The Third Rail of Vendor Pitches

    Agents — The Third Rail of Vendor Pitches

    In politics,  there are issues that are known as “third rail” for being politically charged, even “untouchable.” This  name relates to the third rail in many electrical railway systems — the one...

    Read Article
  • URSNIF Data Theft Malware Shared on Microsoft OneDrive

    URSNIF Data Theft Malware Shared on Microsoft OneDrive

    Netskope Threat Research Labs has observed the URSNIF data theft malware being shared among Microsoft OneDrive users. The malware was observed propagating via a malicious Microsoft Word macro...

    Read Article
  • Bringing the Second Netskope Patent to Life: The Life of a Cloud Transaction

    Bringing the Second Netskope Patent to Life: The Life of a Cloud Transaction

    Today, we announced that we have been issued our second comprehensive CASB patent for delivering granular visibility and enforcing granular policy and data security for cloud delivered services....

    Read Article
  • Netskope Threat Research Labs Technical Analysis: CloudSquirrel Malware

    Netskope Threat Research Labs Technical Analysis: CloudSquirrel Malware

    Visual depiction of the life cycle of the Cloud Squirrel Attack Last week we posted an article, giving an overview about the CloudSquirrel malware campaign that takes advantage of multiple cloud...

    Read Article
  • 5 tips for using a CASB to safely enable social media in your business

    5 tips for using a CASB to safely enable social media in your business

    From Facebook’s 1.65 billion monthly active users to Twitter’s rise as a mainstream broadcast media outlet, social media continues to experience rapid and wide adoption from users around the...

    Read Article
  • Finding Data Exfiltration During the Cloud App Discovery Process

    Finding Data Exfiltration During the Cloud App Discovery Process

    Today I started a Netskope Cloud Risk Assessment for one of my customers, and guess what I found? Data exfiltration activity from compromised network attached storage (NAS) devices communicating...

    Read Article
  • Zepto variant of Locky ransomware delivered via popular Cloud Storage apps

    Zepto variant of Locky ransomware delivered via popular Cloud Storage apps

    Netskope Threat Research Labs has detected a new strain of the Zepto ransomware shared among cloud users. As has been the trend in recent months, this strain of Zepto arrives at its destination...

    Read Article
  • Breaking the Ransomware Kill Chain in the Cloud

    Breaking the Ransomware Kill Chain in the Cloud

    Over the past few months, we’ve published multiple posts here about ransomware – Surprise, Petya/Mischa, Cerber, and cuteRansomware to name a few. One of the common themes that we’ve seen across...

    Read Article
  • CloudSquirrel Malware Squirrels Away Sensitive User Data Using Popular Cloud Apps

    CloudSquirrel Malware Squirrels Away Sensitive User Data Using Popular Cloud Apps

    Netskope has discovered a malware campaign that takes advantage of multiple cloud apps throughout the kill chain. The campaign, which we have dubbed “CloudSquirrel,” has been in operation since...

    Read Article
  • Avoiding Proxy Creep with an Instance-Aware CASB

    Avoiding Proxy Creep with an Instance-Aware CASB

    One of Netskope’s more popular taglines is “Allow is the new Block.” Many times, customers and prospects will ask me what that means and how it impacts them. To answer, I walk them through their...

    Read Article
  • cuteRansomware Uses Google Docs to Fly Under Radar

    cuteRansomware Uses Google Docs to Fly Under Radar

    Ransomware is gaining in popularity. It is a real threat as it seeks to find and encrypt users’ important files and then hold those files for ransom. Netskope has detected and reported on an...

    Read Article
  • Cloud DLP in Healthcare: Five Must-Do Strategies

    Cloud DLP in Healthcare: Five Must-Do Strategies

    The healthcare market is ripe for cloud access security broker (CASB) and cloud data loss prevention (cloud DLP) solutions. Between a major transition to online medical records, a transient and...

    Read Article
  • Five Ways to Tell if Your CASB is in it for the Long Haul

    Five Ways to Tell if Your CASB is in it for the Long Haul

    Everybody seems to want in on the cloud access security broker (CASB) market! In the past year, Cisco acquired CloudLock, Microsoft acquired Adallom, and Blue Coat acquired Elastica and Perspecsys...

    Read Article
  • Anatomy of a Ransomware Attack: Cerber Uses Steganography to “Hide in Plain Sight”

    Anatomy of a Ransomware Attack: Cerber Uses Steganography to “Hide in Plain Sight”

    Ransomware is a hot topic and it’s about to become hotter. Why? Because now it’s targeting our cloud services. Nearly one out of five malware detections in the past month in the Netskope Active...

    Read Article
  • I’ve Discovered 900 Cloud Apps. Now What?!?!

    I’ve Discovered 900 Cloud Apps. Now What?!?!

    In working with many of our customers to implement the Netskope cloud access security broker (CASB), we find that the moments after the customer discovers how many cloud apps are in use in their...

    Read Article
  • loading
    Loading More...