• The Platform

    ExtraHop
    Reveal(x) 360

    Cloud-native visibility, detection, and response
    for the hybrid enterprise.

    Learn More

    Explore Reveal(x)

    How It Works

    Competitive Comparison

    Why Decryption Matters

    Integrations and Automations

    Cybersecurity Services

    Complimentary Shields Up Assessment

    AWS Cloud Security

    What is Network Detection & Response (NDR)?

    Reveal(x) Enterprise: Self-Managed NDR

    Try It for Free

    Reveal(x) 360

    Light up your AWS
    environment.

    No friction.
    No credit card required.

    AWS Partner Network Competency
    Start Free Trial
  • Solutions

    Solutions

    With the power of machine learning, gain the insight you need to solve pressing challenges.

    For Security

    Stand up to threats with real-time detection and fast response.

    Learn More >

    For Cloud

    Gain complete visibility for cloud, multi-cloud, or hybrid environments.

    Learn More >

    For IT Ops

    Share information, boost collaboration without sacrificing security.

    Learn More >

    By Initiative

    • XDR
    • Advanced Threats
    • Ransomware Mitigation
    • Multicloud & Hybrid Cloud Security
    • Implement Zero Trust
    • Security Operations Transformation

    By Vertical

    • Financial Services
    • Healthcare
    • e-Commerce and Retail
    • Education
    • U.S. Public Sector
     Logo

    Complimentary

    Shields Up Assessment

    Align with and implement CISA's cybersecurity guidance

    Start Now

    Get Additional Shields Up Guidance >

  • Customers

    Customers

    Our customers stop cybercriminals in their tracks while streamlining workflows. Learn how or get support.

    Community

    • Customer Portal Login
    • Bundle Gallery
    • Community Forums
    • Customer Stories

    Services

    • Services Overview
    • Reveal(x) Advisor
    • Incident Response
    • Deployment
    • Complimentary Shields Up Assessment

    Training

    • Training Overview
    • Training Sessions

    Support

    • Support Overview
    • Documentation
    • Appliance Policies
    • Knowledge Base
    Seattle Children's Hospital Logo

    Featured Customer Story

    Seattle Children's Hospital

    Seattle Children's and ExtraHop Reveal(x)—Protecting More Than Data

    Read More

    See All Customer Stories >

  • Partners

    Partners

    Our partners help extend the upper hand to more teams, across more platforms.

    Channel Partners

    • Channel Overview
    • Managed Services Providers
    • Overwatch Managed NDR
    • Shields Up Solution Brief

    Integration Partners

    • CrowdStrike
    • Splunk
    • Amazon Web Services
    • Google Cloud Security
    • All Technology Partners

    Panorama Program

    • Partner Program Information
    • Partner Portal Login
    • Become a Partner
    CrowdStrike Logo

    Featured Integration Partner

    CrowdStrike

    * Detect network attacks. * Correlate threat intelligence and forensics. * Auto-contain impacted endpoints. * Inventory unmanaged devices and IoT.

    Read More

    See All Integration Partners >

  • Blog
  • More
    • About Us
    • News & Events
    • Careers
    • Resources
    • About Us
    • The ExtraHop Advantage
    • What Is Cloud-Native?
    • Leadership
    • Board of Directors
    • Contact Us
    • Explore the Interactive Online Demo
    • Sign Up for a Live Attack Simulation
    • Upcoming Webinars and Events
    • Newsroom
    • ExtraHop Media Kit and Brand Guidelines

    Hunter Challenge

    Get hands-on with ExtraHop's cloud-native NDR platform in a capture the flag style event.

    Read More

    • Careers at ExtraHop
    • Search Openings
    • Connect on LinkedIn
    • All Resources
    • Customer Stories
    • Shields Up Resources
    • Ransomware Attacks in 2021: A Retrospective
    • White Papers
    • Datasheets
    • Industry Reports
    • Webinars
    • Cyberattack Glossary
    • Network Protocols Glossary
    • Documentation
    • Firmware
    • Training Videos
X button
Login
Logout
Start Demo

The Platform

Solutions

Customers

Partners

Blog

More

Start the Democaret-right

Contact Uscaret-right

caret-left Back

ExtraHop
Reveal(x) 360

Cloud-native visibility, detection, and response
for the hybrid enterprise.

Learn More

How It Works

Competitive Comparison

Why Decryption Matters

Integrations and Automations

Cybersecurity Services

Complimentary Shields Up Assessment

AWS Cloud Security

What is Network Detection & Response (NDR)?

Reveal(x) Enterprise: Self-Managed NDR

caret-left Back

Solutions

Learn More

Security

Cloud

IT Ops

Use Cases

Explore By Industry Vertical

caret-left Back

Customers

Customer resources, training,
case studies, and more.

Learn More

Customer Portal Login

Cybersecurity Services

Training

ExtraHop Support

caret-left Back

Partners

Partner resources and information about our channel and technology partners.

Learn More

Channel Partners

Integrations and Automations

Partners

caret-left Back

Blog

Learn More
caret-left Back

About Us

News & Events

Careers

Resources

caret-left Back

About Us

See what sets ExtraHop apart, from our innovative approach to our corporate culture.

Learn More

The ExtraHop Advantage

What Is Cloud-Native?

Contact Us

caret-left Back

News & Events

Get the latest news and information.

Learn More

Sign Up for a Live Attack Simulation

Upcoming Webinars and Events

caret-left Back

Careers

We believe in what we're doing. Are you ready to join us?

Learn More

Careers at ExtraHop

Search Openings

Connect on LinkedIn

caret-left Back

Resources

Find white papers, reports, datasheets, and more by exploring our full resource archive.

All Resources

Customer Stories

Shields Up Resources

Ransomware Attacks in 2021: A Retrospective

Cyberattack Glossary

Network Protocols Glossary

Documentation

Firmware

Training Videos

How to Detect and Respond to the Sunburst Attack | ExtraHop PrintNightmare Vulnerability: Detection, Explanation, and Mitigation Log4j Exploits Explained (includes videos) - ExtraHop

Cybersecurity Alerts & Intelligence

How to Detect and Respond to the SUNBURST Attack

  • ExtraHop
  • Updated August 16, 2021

PrintNightmare Vulnerability: Detection, Explanation, and Mitigation

  • Jeff Costlow
  • Updated November 9, 2021

Log4j Exploits Explained

  • Jeff Costlow
  • Updated May 3, 2022

PrintNightmare Vulnerability: Detection, Explanation, and Mitigation


Log4j Exploits Explained


How to Detect and Respond to the SUNBURST Attack

  • Cybersecurity
  • Cloud
  • Tech
  • Community
  • Trending
  • Security Alerts
  • NDR
  • Security Frameworks
  • Decryption
  • Industry Trends

11.4.22

How to Respond to OpenSSL Vulnerabilities

Learn about the risk of OpenSSL vulnerabilities, how to identify devices running OpenSSL, and how to spot exploit attempts after the initial intrusion.

Jeff Costlow

Read On

9.30.22

Exchange Server Security Challenges Explained

How to secure and monitor Microsoft Exchange Server and why decryption is a critical capability for security solutions. Learn more from ExtraHop.

Jeff Costlow

Read On

4.15.22

April Patch Tuesday Vulnerabilities: What You Need to Know

Learn about the risks and remediations for the latest Microsoft Patch Tuesday vulnerabilities.

Jeff Costlow

Read On

3.31.22

How the Spring4Shell Zero-Day Vulnerability Works

Learn how the Spring4Shell zero-day vulnerability works and how it could be weaponized by attackers.

Edward Wu

Read On

3.31.22

Detect and Stop Spring4Shell Exploitation

Get recommendations for how to detect Spring4Shell exploitation and learn how you can use ExtraHop to stop attacks that leverage this vulnerability.

Jeff Costlow

Read On

3.14.22

Practical Steps for Responding to the CISA Warning on Russian Cyber Attacks

Learn common attack techniques and get practical tips for implementing CISA's Shields Up guidance.

Mark Bowling

Read On

3.11.22

Shields Up: A CEO's Guidance for Corporate Leaders on Cybersecurity Readiness

Cybersecurity is essential for any modern organization. As the risk of cyberattacks rises, now is the time for CEOs to reconnect with SecOps teams.

Patrick Dennis

Read On

2.24.22

Build Resilience Amid Rising Risk of Russian Cyberthreats

With the invasion of Ukraine underway, the risk of cyberattacks is rising. Learn what to expect and steps you can take to reduce your attack surface.

Mark Bowling

Read On

12.17.21

Detect Log4j Attacks Hiding in Encrypted Traffic

Learn how attackers are using encrypted protocols to hide Log4j attacks and why decryption has become a necessary capability for detection.

Jeff Costlow

Read On

12.10.21

Log4j Exploits Explained

Understand Log4j exploitation and how to remediate this zero-day vulnerability with ExtraHop Reveal(x).

Jeff Costlow

Read On

11.4.21

Find Exploit Attempts Against the CISA Known Exploited Vulnerabilities

CISA sets tight deadlines to patch exploited CVEs. Learn how you can detect network-based vulnerabilities faster.

Jeff Costlow

Read On

10.25.21

Wildcard Certificate Risks and the ALPACA TLS Attack

Understand wildcard certificate risks, the ALPACA attack, and how to check whether wildcard certificates are putting your organization at risk.

Jeff Costlow

Read On

9.23.21

Understand and Detect vCenter Vulnerability Exploitation

The vulnerability to vCenter Server presents serious risk to organizations. Learn how to detect malicious activity surrounding this vulnerability.

Jeff Costlow

Read On

8.25.21

How ExtraHop Shut Down a C&C Beaconing Attack

A compromised VPN client infects a print server and accesses a critical networking admin tool, ExtraHop Reveal(x) detectors fire.

Daniel Chu

Read On

8.19.21

Security Alert: New Vulnerability Grants IoT Camera Remote Access

A critical vulnerability affects an estimated 83 million recording devices, allowing attackers access to live feed and enabling remote code execution.

Jeff Costlow

Read On

8.11.21

PetitPotam: Expanding NTLM Relay Attacks

Learn how the PetitPotam exploit enables a new variant of NTLM relay attack targeting Active Directory—and how to detect and stop it.

Preston Crowe

Read On

7.15.21

SonicWall Ransomware Warning: Attacks via SRA & SMA Devices

ExtraHop overviews the the SonicWall ransomware warning for SRA & SMA devices and how to detect attacks.

Jeff Costlow

Read On

7.6.21

REvil Ransomware Attack and Supply Chain Risk

The latest REvil ransomware attack is a sophisticated supply chain-based attack on software provider Kaseya that has put up to 1,500 customers at risk.

Jeff Costlow

Read On

7.2.21

PrintNightmare Vulnerability: Detection, Explanation, and Mitigation

What you need to know about the latest PrintNightmare vulnerability (CVE-2021-34527), how it differs from other recent issues with the Print Spooler service, and what you can do to secure your organization.

Jeff Costlow

Read On

5.19.21

Ransomware Is Getting Worse, and a New Name to Prove It: Multifaceted Extortion

Security researcher FireEye Mandiant noted an alarming rise of encryption combined with exfiltration in ransomware attacks. Read more M-Trends Report findings.

Mike Campfield

Read On
Next

+

ExtraHop uses cookies to improve your online experience. By using this website, you consent to the use of cookies. Learn More

Global Headquarters
520 Pike St
Suite 1600
Seattle, WA 98101
United States


EMEA Headquarters
WeWork 8
Devonshire Square
London EC2M 4PL
United Kingdom

APAC Headquarters
3 Temasek Avenue
Centennial Tower
Level 18
Singapore 039190

Platform

  • Reveal(x) 360
  • How It Works
  • Competitive Comparison
  • Why Decryption Matters
  • Integrations and Automations
  • Cybersecurity Services
  • Complimentary Shields Up Assessment
  • AWS Cloud Security
  • What is Network Detection & Response (NDR)?
  • Reveal(x) Enterprise: Self-Managed NDR

Solutions

  • Security
  • Cloud
  • IT Ops
  • Use Cases
  • Industries

Customers

  • Customer Portal Login
  • Services Overview
  • Training Overview
  • Support Overview

Partners

  • Channel Overview
  • Technology Integration Partners
  • Partner Program Information

Blog

More

  • About Us
  • News & Events
  • Careers
  • Resources
  • Copyright ExtraHop Networks 2023
  • Terms of Use
  • Privacy Policy
  • Facebook
  • Twitter
  • LinkedIn
  • Instagram
  • YouTube