NEW

The True Cost of a Security Breach

Arrow pointing right
ExtraHop Logo
  • Productschevron right
  • Solutionschevron right
  • Why ExtraHopchevron right
  • Blogchevron right
  • Resourceschevron right

Arrow pointing leftBlog

ExtraHop June TL;DR

A quick refresh of what you may have missed in cybersecurity for June

Paul Ditty

June 30, 2022

Welcome to the June edition of the ExtraHop TL;DR! This is your place to get the highlights on what we're talking about this month. You can also watch our video broadcasts on the third Friday of every month on our LinkedIn page.

How XDR Gets Real with ExtraHop and CrowdStrike

Advanced attackers work hard to evade defenses and stay stealthy. By seamlessly correlating network intelligence and endpoint visibility, security teams can reduce attacker dwell time and respond instantly to stop an intrusion from becoming a breach. Join CrowdStrike and ExtraHop to learn how to make extended detection and response (XDR) a reality, so your security team can stop ransomware and other advanced threats faster.

ExtraHop Reveal(x) 360 for AWS

Reveal(x) 360 now offers continuous visibility in AWS based on VPC Flow Logs. Organizations can choose flow logs as a standalone subscription or combine that cloud-native data source with packets to take a multi-layered approach to cloud threat defense.

Understanding Shields Up

Implementing CISA's recommended controls may be difficult for security teams already struggling with staffing shortages and challenges related to remote work, cloud adoption, and legacy systems. ExtraHop Reveal(x) network detection and response delivers several vital technical controls to achieve the recommended high-level goals.

Customer Success: Brewin Dolphin

Brewin Dolphin PLC is one of the United Kingdom's leading financial management companies. Find out how ExtraHop gave them deeper visibility and control over their network traffic.

Threat of the Month: Denial of Service (DoS) Attack

A denial-of-service (DoS) attack is a tactic for overloading a machine or network to make it unavailable. Attackers achieve this by sending more traffic than the target can handle, causing it to fail—making it unable to provide service to its normal users. Examples of targets might include email, online banking, websites, or any other service relying on a targeted network or computer.

From the ExtraHop Blog

Take a look at some of our recent stories.

Top 5 Blind Spots in Supply Chain Attacks

Supply chain attacks are on the rise. Learn how to spot and defend against the most common entry points and reduce your organization's supply chain risk.

2022 Edison Awards Honors Advancements in Strategic Decryption

ExtraHop is honored to have received the Silver Award for Cybersecurity for Innovative Services. Learn more about the Edison Awards and why decryption is necessary for security.

Meet the ExtraHop Team Members Honored as 2022 CRN Women of the Channel

ExtraHop is thrilled to honor the winners of the 2022 CRN Women of the Channel. Hear from these female trailblazers on what this achievement means to them.

In Other News

Read, watch, or listen to some interesting news from around the internet.

The Register: CIOs Largely Believe Their Software Supply Chain is Vulnerable

Supply chain attacks have been making global waves. In a recent report, many CIOs understand this risk but have yet to implement a stronger security posture to protect their enterprise.

Dark Reading: ChromeLoader Malware Hijacks Browsers with ISO Files

This malware's abuse of PowerShell makes it more dangerous, allowing for more advanced attacks including ransomware, fileless malware, and malicious code memory injections.

Explore related articles

Experience RevealX NDR for Yourself

Schedule a demo