NEW

2024 True Cost of a Security Breach

Arrow pointing right
ExtraHop Logo
  • Productschevron right
  • Solutionschevron right
  • Why ExtraHopchevron right
  • Blogchevron right
  • Resourceschevron right

Arrow pointing leftBlog

ExtraHop February 2022 TL;DR

A quick refresh of what you may have missed in cybersecurity for February

Paul Ditty

February 28, 2022

Welcome to your February edition of the ExtraHop TL;DR! This is your place to get the highlights on what we're talking about this month. You can also watch our video broadcasts on the third Friday of every month on our LinkedIn page.

Introducing Patrick Dennis, ExtraHop's New CEO

We're excited to introduce the new CEO at ExtraHop, Patrick Dennis. Learn more about him and his commitment to helping stop advanced threats.

2021 Ransomware Retrospective

If 2021 taught us anything, it's that cyber attackers are working with a new playbook. Learn how to combat last year's rise of advanced ransomware techniques.

Man x Machine: The Near Extinction of Maersk

In this exclusive event, Andy Jones, former Global CISO at Maersk, will join former Symantec CTO, Hugh Thompson, to provide an intimate look at one of the most damaging cyber attacks in history.

SANS Modernizing Security Operations: 2021 Survey

Organizations are moving away from simple endpoint detection and investing in new tools and processes. Find out how your SecOps team stacks up and how you can improve incident and response.

Threat of the Month: Brute Force Attack

Brute force attacks are a means of determining a combination of username and password or hashed token in order to gain unauthorized access to an account, file, or other protected information. It's a trial-and-error–based attack method that works by guessing credentials, file paths, or urls, either through logic or running all possible keyboard combinations.

From the ExtraHop Blog

Take a look at some of our recent stories.

IT in the Crosshairs of Modern Ransomware

Ransomware groups are operating with a new playbook. Learn their game plan to defend your organization against their advanced tactics.

Accelerate Cybersecurity Investigations with Threat Briefings

When investigation and response take too long, attackers have a decisive advantage. Learn how to reclaim the upper hand with threat briefings.

In Other News

Read, watch, or listen to some interesting news from around the internet.

The Verge: Crypto.com Admits Over $30M Stolen by Hackers

On January 17, the cryptocurrency exchange company Crypto.com acknowledged a hack that led to over $30 million in stolen Bitcoin and Ethereum.

Security Weekly: Log4Shell Impact and Lessons Learned

Jamie Moles, Senior Technical Marketing Manager at ExtraHop, joins the hosts of Security Weekly to examine Log4Shell with a live demo of this vulnerability.

Explore related articles

Experience RevealX NDR for Yourself

Schedule a demo