back caretBlog

ExtraHop November TL;DR

A quick refresh of what you may have missed in cybersecurity for November

Welcome to this edition of the ExtraHop TL;DR! This is your place to get the highlights on what we're talking about this month. You can also watch our video broadcasts on the third Friday of every month on our LinkedIn page.

 

Introducing Breakthrough Decryption for Microsoft Environments

Get high-fidelity decryption capabilities to detect a new class of advanced attacks—including 'living-off-the-land' and Active Directory Kerberos Golden Ticket attacks—that exploit proprietary Microsoft protocols to evade security controls and traditional monitoring tools like next-generation firewalls (NGFW) and web proxies.

 

Forensics Readiness Speeds Root Cause Analysis

 

Get a practical understanding of incident response, network forensics, and learn how to eradicate intruders and quickly recover your operations.

 

Defending Your Containerized Environments

 

Securing containers requires continuous monitoring, AI-powered analysis, and the ability to detect and respond to advanced threats as they occur. With ExtraHop Reveal(x) 360, you can unify security across containers and services in a single management pane.

 

Threat of the Month: Supply Chain Compromise

 

The supply chain doesn't only affect our shipping and delivery times. It also affects our network security. Learn how advanced attackers use the network's supply chain to infiltrate and create trouble for organizations.

 

 

 

From the ExtraHop Blog

 

Take a look at some of our recent stories.

Our IT Ops Director Gets Colorful in the Name of Tech Diversity

Bri Hatch, Sr. Director of IT Operations, recently raised over $31,000 for organizations committed to diversity in tech. All it took was a fantastic makeover.

 

Find Exploit Attempts Against the CISA Known Exploited Vulnerabilities

 

The Cybersecurity and Infrastructure Security Agency (CISA) recently issued a new directive for federal agencies, which may also serve as best practices for private organizations.

 

Bridging Data Retention Gaps En Route to Zero Trust

 

Change is rapidly underway for many government agencies and public sector organizations as they work to implement fresh zero trust mandates.

 

In Other News

 

Read, watch, or listen to some interesting news from around the internet.

Decrypt as if Your Security Depends on It

ExtraHop's Jamie Moles, Senior Technical Marketing Manager, joins Security Weekly to discuss the various techniques attackers are using encryption to cover their tracks.

 

SolarWinds Attacker Targets Cloud Service Providers

 

The Russia-based threat actor behind the SolarWinds supply chain attack is targeting cloud service providers and IT services organizations in a large-scale and ongoing campaign.

 

ExtraHop Reveal(x) Live Activity Map

Stop Breaches 87% Faster

Investigate a live attack in the full product demo of ExtraHop Reveal(x), network detection and response, to see how it accelerates workflows.

Start Demo

Sign Up to Stay Informed