About
This bio was provided during this employee's time at ExtraHop and does not reflect any current positions or experience.
Jeff Costlow
Jeff Costlow is the CISO at ExtraHop. He started his career in computer security in 1997. Jeff has deep experience with networking protocols, a passion for secure software development and many years of software engineering under his belt.
In his spare time, Jeff enjoys building and sailing small boats, making beer or cider, mentoring for FIRST robotics, and raising Pacific Northwest mason bees.
Posts
11.4.22
How to Respond to OpenSSL Vulnerabilities
Learn about the risk of OpenSSL vulnerabilities, how to identify devices running OpenSSL, and how to spot exploit attempts after the initial intrusion.
Jeff Costlow
9.30.22
Exchange Server Security Challenges Explained
How to secure and monitor Microsoft Exchange Server and why decryption is a critical capability for security solutions. Learn more from ExtraHop.
Jeff Costlow
4.15.22
April Patch Tuesday Vulnerabilities: What You Need to Know
Learn about the risks and remediations for the latest Microsoft Patch Tuesday vulnerabilities.
Jeff Costlow
3.31.22
Detect and Stop Spring4Shell Exploitation
Get recommendations for how to detect Spring4Shell exploitation and learn how you can use ExtraHop to stop attacks that leverage this vulnerability.
Jeff Costlow
12.17.21
Detect Log4j Attacks Hiding in Encrypted Traffic
Learn how attackers are using encrypted protocols to hide Log4j attacks and why decryption has become a necessary capability for detection.
Jeff Costlow
12.10.21
Log4j Exploits Explained
Understand Log4j exploitation and how to remediate this zero-day vulnerability with ExtraHop Reveal(x).
Jeff Costlow
11.4.21
Find Exploit Attempts Against the CISA Known Exploited Vulnerabilities
CISA sets tight deadlines to patch exploited CVEs. Learn how you can detect network-based vulnerabilities faster.
Jeff Costlow
10.25.21
Wildcard Certificate Risks and the ALPACA TLS Attack
Understand wildcard certificate risks, the ALPACA attack, and how to check whether wildcard certificates are putting your organization at risk.
Jeff Costlow
9.23.21
Understand and Detect vCenter Vulnerability Exploitation
The vulnerability to vCenter Server presents serious risk to organizations. Learn how to detect malicious activity surrounding this vulnerability.
Jeff Costlow
8.19.21
Security Alert: New Vulnerability Grants IoT Camera Remote Access
A critical vulnerability affects an estimated 83 million recording devices, allowing attackers access to live feed and enabling remote code execution.
Jeff Costlow
7.15.21
SonicWall Ransomware Warning: Attacks via SRA & SMA Devices
ExtraHop overviews the the SonicWall ransomware warning for SRA & SMA devices and how to detect attacks.
Jeff Costlow
7.6.21
REvil Ransomware Attack and Supply Chain Risk
The latest REvil ransomware attack is a sophisticated supply chain-based attack on software provider Kaseya that has put up to 1,500 customers at risk.
Jeff Costlow
7.2.21
PrintNightmare Vulnerability: Detection, Explanation, and Mitigation
What you need to know about the latest PrintNightmare vulnerability (CVE-2021-34527), how it differs from other recent issues with the Print Spooler service, and what you can do to secure your organization.
Jeff Costlow
5.11.21
Patch Tuesday, May 11: Detecting Critical Vulnerabilities
Today was Microsoft Patch Tuesday, and while there were a relatively small number of patches issued—55 as compared to the usual 100 plus—a few of those vulnerabilities require immediate attention.
Jeff Costlow
4.21.21
Find SonicWall Vulnerabilities With an Inventory of Devices and Software
The SonicWall vulnerabilities are the latest in a spat of serious CVEs. ExtraHop explains how to inventory your devices and software to prevent exploits.
Jeff Costlow
3.23.21
Prevent REvil Ransomware Encryption & Exfiltration Attacks
The REvil attack's encryption and exfiltration of Acer files is a ransomware trend that can be prevented with ExtraHop. Learn more.
Jeff Costlow
3.3.21
The Recent Exchange Server Vulnerability and SSRF Attacks
A new Exchange server vulnerability is being exploited to perpetrate active server side request forgery (SSRF) attacks.
Jeff Costlow
11.2.20
Security Alert: Ransomware Warning for Healthcare
A recent cybersecurity advisory issued by the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Health and Human Services (HHS) warns of an imminent cybercrime threat to hospitals.
Jeff Costlow
10.14.20
Detect Bad Neighbor Vulnerability on Windows 10 Systems
The Windows 10 vulnerabilities unveiled by Microsoft on October 13 include a remote DoS (CVE-2020-16899) and a remote code execution flaw (CVE-2020-16898) dubbed 'Bad Neighbor'. Get the rundown on potential exploits and what you should do.
Jeff Costlow
9.16.20
Security Alert: Detecting CVE-2020-1472 Zerologon Exploitation with NDR
The recent Zerologon vulnerability (CVE-2020-1472) could allow attackers to get control of a Windows domain without any user credentials. Learn how it works and how to protect against exploits.
Jeff Costlow
7.24.20
Ripple20: How to Identify Vulnerable Devices
The Ripple20 group of vulnerabilities affects hundreds of millions of devices across many industries. Learn how to identify devices using the vulnerable Treck software and detect Ripple20 exploits.
Jeff Costlow
6.11.19
NSA's Advice on BlueKeep: Know Your Network
Reveal(x) Now Detects Evidence of BlueKeep (CVE-2019-0708)
Jeff Costlow
12.6.18
We Busted A Fake Chrome Extension That Was Trying to Steal Data
A mysterious (and fake) Chrome extension. A clever data exfiltration scheme. They would have gotten away with it, too, if it weren't for those meddling security analysts using ExtraHop Reveal(x)! Follow along as we go from threat detection to response in this real-life threat hunt with network traffic analysis.
Jeff Costlow
8.29.18
Detect Apache Struts 2 Exploit CVE-2018-11776 with ExtraHop
There is a new Apache Struts vulnerability. ExtraHop customers can use this technique to monitor for IOCs while they work to update their software.
Jeff Costlow
12.21.17
Your Windows Proxy Autodiscovery Could Be Compromised
Your Windows proxy autodiscovery could be compromised. Learn about the WPAD exploit and how to detect it with ExtraHop.
Jeff Costlow
9.19.17
Visibility into TLS: Perfect Forward Secrecy
What is Perfect Forward Secrecy encryption and how ExtraHop allows you to decrypt Perfect Forward Secrecy in real time.
Jeff Costlow