Get the new Post-Intrusion Report

The latest research shows spikes in reconnaissance and lateral movement, changes in command-and-control attack techniques, and a penchant for using hidden tunnels to smuggle data within HTTPS traffic.


Vectra named Cool Vendor in Security Intelligence, 2015

Cool Vendors in security intelligence offer highly innovative technologies that address an organization's demand for data-driven analytics, techniques in obfuscation and deception, and advanced detection solutions.


Insider Threat
Spotlight Report

This survey of more than 500 cybersecurity professionals in the Information Security Community on LinkedIn reveals that insider threats are rising, but IT security budgets are not.


Stop attacks
in real time

Vectra and John Pescatore of SANS analyze recent advanced targeted attacks, highlight new trends and common features, and discuss the best way to detect and mitigate these threats.


Security that thinks

Vectra continuously listens, thinks and learns. Adapting to the fast-changing malware threat landscape, Vectra instantly detects attacks at every phase as they are happening.




Up and running in minutes. Vectra learns everything it needs to know.


Continuous malware threat monitoring instantly identifies any phase of an attack.


The Threat Certainty Index™ ensures you address the highest malware threat first.


Learns new malware threat behaviors and adapts to your ever-changing network.


Belkin F9K1111 V1.04.10 Firmware Analysis
19 August 2015

Recently, it came to our attention that HP DVLabs has uncovered at least ten vulnerabilities in the Belkin N300 Dual-Band Wi-Fi Range Extender (F9K1111). In response to this, Belkin released firmware version 1.04.10. As this is the first update issued for the F9K1111 and there were not any public triggers for the vulnerabilities, we thought it would be interesting to take a deeper look. More

View More Blog Posts

News & Media

A CISO's Strategy for Fighting Phishing Attacks
Healthcare Info Security | 24 August 2015

Hacker attacks often start with spear-phishing attempts used to obtain credentials or deliver malware. But healthcare entities can take steps to help prevent these scams from being successful, says Connie Barrera, CISO of Jackson Health System in Miami. More

Cyber Defenders 'boot camp' prepares students for mission-critical roles in wake of OPM breach
Lawrence Livermore National Labs | 24 August 2015

Against the backdrop of the Office of Personnel Management (OPM) breach, the 2015 edition of the Laboratory’s Cyber Defenders internship offers an especially compelling introduction to cybersecurity for students who may soon serve on the front lines of cyberdefense. More

Threat intelligence needs to grow up
CSO | 13 August 2015

Security teams are overwhelmed with a massive amount of threat data. While a decade ago no one was talking about threat intelligence except government agencies, organizations are now bombarded with threat data leaving them challenged with identifying what is relevant. More

Recently Patched Internet Explorer Flaw Added to Angler Exploit Kit
Security Week | 11 August 2015

The Jscript9 memory corruption vulnerability (CVE-2015-2419) affecting Internet Explorer 11 was identified by researchers at Vectra Networks in July while analyzing the files leaked as a result of the data breach suffered by Italian surveillance software maker Hacking Team. The flaw was identified by Vectra experts based on an email in which someone offered to sell the exploit to Hacking Team. More

Angler EK exploits recently patched IE bug to deliver ransomware
Help Net Security | 11 August 2015

If they haven't already, Internet Explorer users would do well to implement the security update provided by Microsoft last month, as among the fixed vulnerability is one that is currently being exploited via the popular commercial Angler exploit kit. More

Q&A; With Black Hat, DEF CON Founder Jeff Moss
eWeek | 3 August 2015

In-demand consultant and former hacker Jeff Moss offers his takes on trends, privacy, machine learning -- and why you should always keep your keys in your pocket. More

Addressing Cybersecurity and the Insider Threat
Security Magazine | 1 August 2015

In the wake of massive data breaches such as those at the U.S. government’s Office of Personnel Management, health insurer Anthem and retailer Target, an enterprise’s initial reaction might be to tighten the security around networks and data. However, you may be forgetting one critical component: the insider threat. More

Der Bundestag-Hack und die Folgen
Computerwoche | 29 July 2015

Hacker installieren Schadsoftware auf Computern des Bundestages sowie des Kanzleramts und greifen über Monate hinweg sensible Daten ab, ohne bemerkt zu werden. Welche Bedrohungen existieren für deutsche Unternehmen und Verbraucher? Und wie kann man sich schützen, wenn überhaupt? More

Automated threat management: No signature required
Help Net Security | 28 July 2015

The industry approach to detecting threats is inherently reactive, ceding the first-mover advantage to the cyber criminals. Defenses – based on signatures, reputation lists and blacklists – are only designed to recognize threats that have been previously seen. This means someone needs to be the first victim, and everyone hopes it’s not them. More

Vectra Networks Recognized by CRN as a 2015 Emerging Vendor
CRN | 22 July 2015

Vectra earns spot on select list featuring coolest tech startups heating up the IT channel for equipping partners with differentiated automated threat detection offering. More

Vectra Networks Recognized by CRN as a 2015 Emerging Vendor
Vectra Press Release | 22 July 2015

Vectra earns spot on select list featuring coolest tech startups heating up the IT channel for equipping partners with differentiated automated threat detection offering. More

VIDEO: Vectra Networks Chief Tech. Officer Oliver Tavakoli
PBS; Tavis Smiley | 17 July 2015

The Chief Technology Officer at the cybersecurity company Vectra shares how the public can keep their information safe in today’s web-driven world. More

Hacking Team leak reveals zero-day IE 11 bug | 17 July 2015

Security company Vectra Networks has detected a zero-day vulnerability affecting Microsoft's Internet Explorer (IE) 11, after scanning through the huge cache of data logs leaked from Hacking Team. More

Adobe, Microsoft and Oracle Patch for Hacking Team Flaws
eWeek | 16 July 2015

Zero-days patched across major vendors expand the fallout from the Hacking Team breach, but that's not the only source of vulnerability disclosures this month. More

The old way of stopping cyber attacks is no longer working
eSchool News | 15 July 2015

Firewalls alone may not be enough to stop cyber attacks. For that, there’s data science More

Who did DOD CIO Terry Halvorsen visit in Silicon Valley?
Washington Technology | 15 July 2015

Defense Department CIO Terry Halvorsen’s visit to Silicon Valley in April included 29 companies, including Vectra Networks, with a focus on security, big data analytics and infrastructure management. More

Microsoft kills 2 security bugs
WinBeta | 15 July 2015

Vectra Networks discovered a security flaw in the latest version of Internet Explorer 11 on Windows 7 and Windows 8.1 devices through monitoring an online conversation between a security researcher and malware developer Hacker Team regarding the sale of information relating to the flaw. More

Hacking Team Dump: Windows Zero Day; Microsoft Patches Flaw That Was Pitched to Spyware Vendor
Data Breach Today | 15 July 2015

Vectra says it notified Microsoft about the flaw on July 9, then waited to release details of the flaw until a Windows fix had been released, just five days later. "They were able to work on this very quickly," threat researcher Wade Williamson, director of product marketing at Vectra Networks. More

Another "Hacking Team" zero-day surfaces - this time in IE, not Flash!
Naked Security | 15 July 2015

According to security researchers at Vectra Networks, this latest vulnerability in Internet Explorer was patched in amongst Microsoft's latest Update Tuesday fixes, which came out on 14 July 2015. More

MS kills critical IE 11 bug after exploit was shopped to Hacking Team
Ars Technica | 14 July 2015

The IE vulnerability was discovered in an e-mail a security researcher sent to Hacking Team executives, according to a blog post published Tuesday by researchers from security firm Vectra Networks. More

Microsoft Patches Hacking Team Zero-Days, Other Vulnerabilities
Security Week | 14 July 2015

Microsoft has released a total of 14 bulletins as part of the company’s July 2015 security updates. One of the zero-day vulnerabilities is a Jscript9 memory corruption vulnerability (CVE-2015-2419) identified by researchers at Vectra Networks. The flaw affects Internet Explorer 11 and it can be exploited to gain complete control of a vulnerable system. More

Microsoft patches Internet Explorer vulnerability offered to Hacking Team
CSO | 14 July 2015

According to Vectra Networks, the vulnerability fixed by Microsoft impacts fully patched versions of Internet Explorer 11 on both Windows 7 and Windows 8.1. More

View All News & Events


Upcoming Events

Gartner Security and Risk Management, London

14 September 2015 to 15 September 2015
Park Plaza Westminster Bridge

Validate your security and risk management strategy, so you can see what needs to be improved, kept the same, or changed in your approach for a clear vision into the future.

What you will learn:

  • Structure and manage each of your individual IT risk programs
  • Make IT risk programs more efficient and effective
  • Select approaches and vendor solutions
  • Articulate security and risk requirements in business language
  • Integrate BCM with overall risk and security programs
  • Architect an overall security and risk management strategy aligned to business needs
Register today.

(ISC)^2 Secure Events

15 September 2015 9 AM - Hilton Boston Woburn

With cyber security breaches garnering front page headlines, the time has come to recast our profession as an enabler of the business in these trying times. To gain the traction we so desperately need requires learning new cyber security skills.

At this full day event, you will learn:

  • How to build a an effective business case for your infosec program or new project
  • How to demonstrate the business value of information security
  • How to partner with your vendors to achieve force multiplication in establishing your credibility and business alignment
  • The power of storytelling in getting stakeholder buy-in
Register today.

View all events »