Security

Security analytics, trends, experiments, and more.

Blog Categories:

Learn from Medilink CEO Esther Go how her team stopped a ransomware attack in progress, and now automates their security processes with ExtraHop.

Real-time network analytics with ExtraHop can detect Russian cyber attacks in real time. Find out how it works.

Follow along as we hunt a real threat using east-west L7 visibility from ExtraHop!

ExtraHop placed furthest to the right for completeness of vision on Gartner's NPMD MQ for the 2nd year in a row. Here's why I believe we're the next big NPMD success story.

The best way to detect Memcrashed DDoS attacks early is through real-time network monitoring. Learn how from the leaders in real-time security analytics.

Learn how malvertising, or malware-advertising, works, plus steps to avoid becoming a victim.

Get to know the growing underworld of bitcoin mining malware, a growing computer virus trend that turns unsuspecting computers into profitable machines for hackers.

New methods prove it's possible to steal data using only SSL/TLS handshakes. Here's how you can stop it.

ExtraHop has launched ExtraHop Reveal(x), a new security analytics product aimed at increasing critical asset visibility and automating investigations.

ExtraHop has launched Reveal(x), a new security analytics product designed to increase critical asset visibility and automate investigations. Here's how it works.

How to defend against WPAD exploit aPAColypse now

Learn about doxware, including why it's becoming more and more popular to cyber criminals, and how to protect against a doxware attack.

Build Something Great

Join the company that was named one of Seattle's Best Companies to Work For.