Get the new Post-Intrusion Report

The latest research shows spikes in reconnaissance and lateral movement, changes in command-and-control attack techniques, and a penchant for using hidden tunnels to smuggle data within HTTPS traffic.

GET THE REPORT

Vectra named Cool Vendor in Security Intelligence, 2015

Cool Vendors in security intelligence offer highly innovative technologies that address an organization's demand for data-driven analytics, techniques in obfuscation and deception, and advanced detection solutions.

GET THE REPORT

Insider Threat
Spotlight Report
2015

This survey of more than 500 cybersecurity professionals in the Information Security Community on LinkedIn reveals that insider threats are rising, but IT security budgets are not.

GET THE REPORT

Stop attacks
in real time

Vectra and John Pescatore of SANS analyze recent advanced targeted attacks, highlight new trends and common features, and discuss the best way to detect and mitigate these threats.

REGISTER TO WATCH THE WEBINAR

Security that thinks

Vectra continuously listens, thinks and learns. Adapting to the fast-changing malware threat landscape, Vectra instantly detects attacks at every phase as they are happening.

SEE HOW IT WORKS

Benefits

Easy

Up and running in minutes. Vectra learns everything it needs to know.

Real-time

Continuous malware threat monitoring instantly identifies any phase of an attack.

Prioritized

The Threat Certainty Index™ ensures you address the highest malware threat first.

Adaptive

Learns new malware threat behaviors and adapts to your ever-changing network.

Blog

Microsoft Internet Explorer 11 Zero-day
27 July 2015

Summary On July 6th, information spread that the Italian company known as the Hacking Team were themselves the victims of a cyber attack. In the aftermath of this leak, Vectra researchers have analyzed the leaked data, and identified a previously unknown vulnerability in Internet Explorer 11 that impacts a fully patched IE 11 on both Windows 7 and Windows 8.1. More

View More Blog Posts

News & Media

Automated threat management: No signature required
Help Net Security | 28 July 2015

The industry approach to detecting threats is inherently reactive, ceding the first-mover advantage to the cyber criminals. Defenses – based on signatures, reputation lists and blacklists – are only designed to recognize threats that have been previously seen. This means someone needs to be the first victim, and everyone hopes it’s not them. More

Vectra Networks Recognized by CRN as a 2015 Emerging Vendor
Vectra Press Release | 22 July 2015

Vectra earns spot on select list featuring coolest tech startups heating up the IT channel for equipping partners with differentiated automated threat detection offering. More

VIDEO: Vectra Networks Chief Tech. Officer Oliver Tavakoli
PBS; Tavis Smiley | 17 July 2015

The Chief Technology Officer at the cybersecurity company Vectra shares how the public can keep their information safe in today’s web-driven world. More

Hacking Team leak reveals zero-day IE 11 bug
V3.co.uk | 17 July 2015

Security company Vectra Networks has detected a zero-day vulnerability affecting Microsoft's Internet Explorer (IE) 11, after scanning through the huge cache of data logs leaked from Hacking Team. More

Adobe, Microsoft and Oracle Patch for Hacking Team Flaws
eWeek | 16 July 2015

Zero-days patched across major vendors expand the fallout from the Hacking Team breach, but that's not the only source of vulnerability disclosures this month. More

The old way of stopping cyber attacks is no longer working
eSchool News | 15 July 2015

Firewalls alone may not be enough to stop cyber attacks. For that, there’s data science More

Microsoft kills 2 security bugs
WinBeta | 15 July 2015

Vectra Networks discovered a security flaw in the latest version of Internet Explorer 11 on Windows 7 and Windows 8.1 devices through monitoring an online conversation between a security researcher and malware developer Hacker Team regarding the sale of information relating to the flaw. More

Hacking Team Dump: Windows Zero Day; Microsoft Patches Flaw That Was Pitched to Spyware Vendor
Data Breach Today | 15 July 2015

Vectra says it notified Microsoft about the flaw on July 9, then waited to release details of the flaw until a Windows fix had been released, just five days later. "They were able to work on this very quickly," threat researcher Wade Williamson, director of product marketing at Vectra Networks. More

Another "Hacking Team" zero-day surfaces - this time in IE, not Flash!
Naked Security | 15 July 2015

According to security researchers at Vectra Networks, this latest vulnerability in Internet Explorer was patched in amongst Microsoft's latest Update Tuesday fixes, which came out on 14 July 2015. More

MS kills critical IE 11 bug after exploit was shopped to Hacking Team
Ars Technica | 14 July 2015

The IE vulnerability was discovered in an e-mail a security researcher sent to Hacking Team executives, according to a blog post published Tuesday by researchers from security firm Vectra Networks. More

Microsoft Patches Hacking Team Zero-Days, Other Vulnerabilities
Security Week | 14 July 2015

Microsoft has released a total of 14 bulletins as part of the company’s July 2015 security updates. One of the zero-day vulnerabilities is a Jscript9 memory corruption vulnerability (CVE-2015-2419) identified by researchers at Vectra Networks. The flaw affects Internet Explorer 11 and it can be exploited to gain complete control of a vulnerable system. More

Microsoft patches Internet Explorer vulnerability offered to Hacking Team
CSO | 14 July 2015

According to Vectra Networks, the vulnerability fixed by Microsoft impacts fully patched versions of Internet Explorer 11 on both Windows 7 and Windows 8.1. More

High severity Internet Explorer 11 vulnerability identified after Hacking Team breach
Help Net Security | 14 July 2015

After analyzing the leaked data from last week's attack on Hacking Team, Vectra researchers discovered a previously unknown high severity vulnerability in Internet Explorer 11, which impacts a fully patched IE 11 web browser on both Windows 7 and Windows 8.1. More

Vectra Networks Discovers High Severity Internet Explorer 11 Vulnerability Following Hacking Team
Dark Reading | 14 July 2015

Vectra Threat Lab Finds Exploitable Use-After-Free Vulnerability that Can Let Attackers Bypass Standard Memory Protections in Popular Web Browser More

Vectra Networks Discovers High Severity Internet Explorer 11 Vulnerability Following Hacking Team Cyber Attack
Vectra Press Release | 14 July 2015

Vectra Threat Labs discovered a high severity vulnerability in Internet Explorer (IE) 11 last week following the cyber attack on the Italian company known as Hacking Team. Remediation is being announced today in Microsoft’s Security Bulletin. More

Microsoft Patches Hacking Team Windows Kernel Zero Day
ThreatPost | 14 July 2015

The Internet Explorer bulletin, MS15-065, patches 29 vulnerabilities in the browser including four that have been publicly disclosed, including a Jscript9 memory corruption bug reported by Vectra Networks. More

July 2015 Patch Tuesday: Microsoft and Adobe attack Hacking Team zero-days
TechTarget | 14 July 2015

Vectra Networks reported the vulnerability to Microsoft on July 9th. Vectra said the flaw occurs within a custom heap in JSCRIPT9, meaning it may allow an attacker to bypass protections found in standard memory. More

Vectra Networks veut détecter les signaux faibles sur le réseau
LeMagIT | 9 July 2015

Vectra Networks n’es plus exactement ce que l’on appelle une jeune pousse. L’entreprise existe depuis quatre ans. Mais sa technologie a récemment été distinguée par l’Innovation Sandbox de la dernière édition de RSA Conference. More

VIDEO: Are most companies in the dark on hack attacks?
MSN | 8 July 2015

Vectra Networks CEO Hitesh Sheth discusses cyber-attacks, the importance of discovering breaches and the security of networks. More

The Phases of a Data Breach: Finding the Attack Before the Damage is Done
Legaltech News | 6 July 2015

A new report from security firm Vectra looks at the strategic phases of a cyberattack and what companies can do to shore up their defenses. More

Three per cent of firms studied were victims of data theft: Report
IT World Canada | 6 July 2015

Vectra Networks says metadata from 40 customer network it analyzed showed one or more indicators of a targeted (as opposed to opportunistic) attack in every company that bypassed any defence the organization threw up. Not only that, three per cent of the companies showed evidence of data theft. More

Aadhaar, IRCTC and the NJAC Eminences
ComputerWorld India | 3 July 2015

Backed by a database that can be hacked into and changed, the NJAC may not really fix the perceived wrongs in the Supreme Court collegium system. More

View All News & Events

Awards

Upcoming Events

Black Hat USA 2015

5 August 2015 to 6 August 2015
Mandalay Bay Convention Center

Black Hat - built by and for the global InfoSec community - returns to Las Vegas for its 18th year. This six day event begins with four days of intense Trainings for security practitioners of all levels (August 1-4) followed by the two-day main event including over 100 independently selected Briefings, Business Hall, Arsenal, Pwnie Awards, and more (August 5-6). Register today.

EUCI Oil & Gas Cybersecurity Conference- Houston

10 August 2015 to 11 August 2015
Houston Marriott West Loop by The Galleria

EUCI's Oil and Gas Cybersecurity conference is bringing together energy cyber security experts to share real life experiences in preparing for and dealing with the increasingly complex and evolving cyber threats. Cyber-attacks against the oil and gas industry have been steadily increasing. As a result, it is imperative for oil and gas professionals to keep up with evolving technologies and how best to protect the industry from these threats. Atendees will have the opportunity to: -Review the security threat landscape -Address regulatory developments -Discuss penetration testing testing methods -Benefits of building an integrated total security solution -Leverage threat intelligence and security analytics in protecting critical infrastructure -Review cloud technologies that can provide numerous security benefits -Discuss best practices -Address response management strategies to prepare for any cyber breaches -Review formal and informal sharing techniques Register today.