NEW

The True Cost of a Security Breach

Arrow pointing right
ExtraHop Logo
  • Productschevron right
  • Solutionschevron right
  • Why ExtraHopchevron right
  • Blogchevron right
  • Resourceschevron right

Arrow pointing leftBlog

ExtraHop January 2022 TL;DR

A quick refresh of what you may have missed in cybersecurity for January

Paul Ditty

January 28, 2022

Welcome to your New Year edition of the ExtraHop TL;DR! This is your place to get the highlights on what we're talking about this month. You can also watch our video broadcasts on the third Friday of every month on our LinkedIn page.

KuppingerCole Ranks ExtraHop #3 in NDR Market

ExtraHop ranked #3, making it a market leader in the KuppingerCole Network Detection and Response (NDR) Leadership Compass! Learn about their differentiators and get an overview of the NDR market.

SANS 2021 SOC Survey

Organizations have made big changes to their SOCs. In a recent survey, SANS reveals the most targeted industries and the newest detection tools. Read the report to discover the greatest barriers to success and gain valuable insights into SOC best practices.

SANS Ransomware Prevention Special Report

Ransomware was pervasive throughout 2021 and isn't going to slow down any time soon. This report covers common attack vectors and offers insight into how ransomware spreads. While the landscape is constantly changing, it's important to know what to look out for and how maintaining proper security hygiene can help protect your network.

Ransomware Mitigation

Modern ransomware is no longer just an encryption play. Attackers get their claws into your network infrastructure to amplify damage and halt your business operations. Stop them before they set their extortion trap.

Threat of the Month: Cryptomining Malware

Cryptomining malware, or cryptojacking, is a malware attack that co-opts the target's computing resources in order to mine cryptocurrencies like bitcoin. This malware uses a systems CPU and sometimes GPU to perform complex mathematical calculations that result in long alphanumeric strings called hashes.

From the ExtraHop Blog

Take a look at some of our recent stories.

What's New in 8.7 and Reveal(x)

Get a preview of our most exciting new features, then check out the release notes for a comprehensive view of our 8.7 updates and Log4Shell response.

Detect Log4j Attacks Hiding in Encrypted Traffic

ExtraHop threat researchers have observed attackers using encrypted traffic to avoid detection of Log4Shell attacks. Learn how to retool your security to spot intrusion.

How Reveal(x) Supports OMB M-21-31

Since the release of M-21-31, federal agencies have been modernizing to meet the next benchmarks. Find out how ExtraHop can help meet basic logging and data retention requirements.

In Other News

Read, watch, or listen to some interesting news from around the internet.

Dark Reading: 7 Steps for Navigating a Zero-Trust Journey

Few technology concepts have been more confused and distorted as zero trust. Discover how organizations can shift their mindset to better security practices.

The Register: Privacy Flaw in Bluetooth Reboot of Play Phone

Fisher Price's updated toy connects to smartphones, can be used as a speaker phone, and can make calls. It also has 'kindergarten-grade' security that allows in-home surveillance.

Explore related articles

Experience RevealX NDR for Yourself

Schedule a demo