Category: ExtraHop Blog

ExtraHop Is the Proud Home of the Binary 12th Man!

January 12, 2015 | By Tyson Supasatit | Add a Comment

The 00001100th Man is ExtraHop’s geeky salute to a beloved Seahawks tradition. It’s our way of showing our love for the amazing Seattle technology community that is cheering for the Seahawks alongside us. Want to join ExtraHop’s Legion of Geek? We’re looking for exceptional people who love technology, appreciate elegant solutions to hard problems, and [...]

0

Continue Reading

Turla Trojan Tactics Trounced

January 7, 2015 | By Colin Walker | Add a Comment

About a month or so back, just before the holiday stretch set in for many of us here in North America, Ars Technica put out an article depicting a new vector for Turla, namely a “Powerful, highly stealthy Linux trojan” that “may have infected victims for years.” I don’t know about you, but to me [...]

0

Continue Reading

Community: The Icing on Your ExtraHop & Why I’m Here

December 17, 2014 | By Colin Walker | 8 Comments

Some days I just frackin’ love what I do. Taking a figurative hammer to the metaphorical tough nut in the form of a complex problem and cracking that baby wide open is just plain fun. Getting to use wickedly cool technology to do so is just icing on the cake. Tasty, decadent icing. Whether it’s [...]

0

Continue Reading

Track the Entire Threat Lifecycle with ExtraHop + FireEye TAP

December 8, 2014 | By Chris Abella | Add a Comment

Visibility gets you many things: high-performing applications, faster remediation and, perhaps most importantly, peace of mind. That’s why we’re super excited to show off our recently announced partnership with the FireEye Threat Analytics Platform (TAP). Taking advantage of the ExtraHop Open Data Stream, we combine industry-leading security expertise from FireEye with the ExtraHop platform’s unprecedented [...]

0

Continue Reading

Detect and Track HTTP-based C&C Traffic for Backoff Malware

December 3, 2014 | By Mitchell Schwartz | Add a Comment

Roughly 1,000 retail companies have been impacted by the Backoff point-of-sale malware with costs related to data breaches totaling more than $150 million, according to a recent eWEEK article. If your organization relies on point-of-sale terminals, the best approach is to assume that your systems are already compromised and to look for malicious activity within [...]

0

Continue Reading

The Big Data Opportunity for Healthcare with HL7 Analytics

November 5, 2014 | By Tyson Supasatit | Add a Comment

If there’s any industry that stands to benefit from IT-enabled insights, it’s healthcare. However, traditional methods of analyzing healthcare operations data are costly, rigid, and complex. Clinical and operations data must first be logged in applications such as Cerner, Epic, PeopleSoft, LabMed, and Allscripts, and then cleansed and fit into a standard data model. When [...]

0

Continue Reading

Programming by Voice: Staying Productive without Harming Yourself

October 20, 2014 | By Tony Grosinger | Add a Comment

One of the reasons I love working at ExtraHop is the lack of meetings and abundance of uninterrupted development time. However, I quickly found after starting that I was unaccustomed to coding for such long periods. A few weeks after I started at ExtraHop, I began to develop discomfort in my wrists and forearms. I [...]

0

Continue Reading

Neuter the POODLE: Detect All SSLv3 Clients and Servers with ExtraHop

October 15, 2014 | By Tyson Supasatit | Add a Comment

Following on the heels of the Heartbleed and Shellshock exploits, the new POODLE vulnerability in SSL version 3.0 (SSLv3) is the latest to require IT teams to identify and patch vulnerable systems. Published by Google’s security team today (Tuesday, October 14), the POODLE vulnerability targets a version of SSL that is 15 years old but still [...]

0

Continue Reading

Monitor Shellshock Attempts with ExtraHop

September 27, 2014 | By Ryan Corder | Add a Comment

On Wednesday, NIST released information about a vulnerability in the GNU Bash shell that enables remote attackers to execute arbitrary code on the target system. For details, I recommend this excellent post from Troy Hunt: Everything you need to know about the Shellshock Bash Bug. One of the especially worrisome aspects of this vulnerability is [...]

0

Continue Reading

IT Is Drowning in Data, But Thirsty for Insight

September 12, 2014 | By Tyson Supasatit | Add a Comment

Water, water, every where, Nor any drop to drink. – The Rime of the Ancient Mariner IT teams have plenty of data. What they lack is visibility and insight. Over the past several weeks, ExtraHop has introduced two new capabilities that help IT organizations extract more value out of the data that they already have. [...]

0

Continue Reading