Detect & Respond to Advanced Cloud Threats with Upwind

A diagram features a central purple circle with six arrows pointing outward to red circles containing icons: a lock, computer screen, fishing hook, smartphone, Bitcoin symbol, and stacked rectangles. The word upwind is at the top left.

Upwind’s next-generation cloud security platform not only provides real-time risk analysis and threat detection, it also gives you the ability to respond to threats in real time.  In this article, we will dive deep into how Upwind detects threats in real time, our advanced methods of  activity-based threat detection, and ways you can stop or […]

Cloud Heist: How Hackers Lock Accounts and Drain Wallets

Futuristic graphic featuring a glowing cloud icon at the center of a circular dial with measurement markings. The background has a gradient of blue and gray tones, with the word Upwind in the top right corner.

Cloud environments have changed how organizations manage their infrastructure, offering flexibility and scalability. But these benefits also bring new risks, and even small mistakes in cloud security can have serious consequences. For example, Google Cloud once accidentally deleted data from a $125 billion Australian pension fund due to a simple configuration error. Although this wasn’t […]

How Adversaries Use Telegram to Evade Detection

A pink and white sunburst pattern with a central white paper airplane icon in a pink circle. The top left corner has the text upwind in black.

In recent years, there has been a significant increase in adversaries exploiting popular messaging apps such as Telegram, Discord, Signal, and others to conceal their malicious activities. Among these platforms, Telegram stands out due to its robust security features, including end-to-end encryption and anonymous account creation, making it a go-to tool for cybercriminals. Overview Most […]

Understanding File-Based Attacks

Illustration of bees on a vibrant honeycomb pattern. Some cells are highlighted in red with alert symbols, suggesting danger or anomaly. The Upwind logo is visible in the top right corner.

File-based attacks are a growing concern in cybersecurity. These attacks involve tampering with files to gain unauthorized access, steal information, or cover up malicious activities. In this post, we’ll break down what file-based attacks are, look at some real-world examples, and walk through a typical attack scenario. What Are File-Based Attacks? File-based attacks exploit how […]

Enhance Your Threat Detection Capabilities with Custom Policy Scope 

A pattern of shields with check marks, mostly in light purple, fills the background. One shield in the center stands out in a darker purple. The word upwind is in the top left corner in black and pink.

We are excited to announce a significant new capability, giving you the ability to customize threat detection policy scope in the Upwind platform. Upwind has always provided powerful out-of-the-box threat detection policies based on predefined attack vectors, ensuring real-time threat detection. With this new capability, Upwind provides even more customization to fit your unique infrastructure […]

How Organizations Use Upwind’s File-Based Threat Monitoring

Illustration of bees on flowers with petal-shaped icons, representing various apps and notifications, surrounding each bee. The word upwind is at the top center. The design is repetitive, with five flowers spread across the image.

Upwind’s threat detection capabilities give you real-time protection against cloud attacks, including malicious file activities. Upwind’s lightweight, high-performance eBPF sensor goes beyond monitoring file activities to enrich that data with information about an event’s context and provide insights into the actions taken on the file, including read, write, and truncate (delete).  You can leverage this […]

Power Your Cloud Security with Software Development Lifecycle (SDLC) Context

A graphic with a central rocket icon surrounded by four smaller icons: a user, a wrench, a scanning symbol, and an exclamation mark, all connected by arrows. The upwind logo is in the top left corner.

We are excited to introduce a new capability that enables you to bring-your-own version control system to the Upwind platform – which integrates rich context from pull requests and build-time activities directly into our cloud infrastructure security platform.  Upwind offers unprecedented end-to-end visibility of your cloud infrastructure and applications, marrying intelligence from both build time and […]

Connect the Dots for Security Findings with Upwind’s Threat Stories

Circular diagram with a central orange scroll icon, surrounded by concentric circles of blue and pink dots. The upwind logo is in the top left corner.

We are excited to announce the release of Upwind’s “Threat Stories” – a GenAI-based capability designed to address the challenge of connecting the dots between seemingly isolated security findings. By providing a unified narrative that consolidates and contextualizes events Upwind has determined to be related, Threat Stories enhance the comprehensiveness of our detections with detailed […]

Prioritize & Eliminate Critical Risks with Upwind

Upwind brings a new approach that redefines the speed, visibility and actionability of cloud security, cutting 95% of alert noise to help you focus on your most critical risks. The Upwind Cloud Security Platform gives you the ability to: Accelerate productivity and empower your Dev, Security, and DevOps teams to innovate within a secure & […]

Detect Malicious File Activities 

Diagram with a bee in the center surrounded by blue and red arrows. Blue arrows lead to icons of documents and alerts, while red arrows lead to security symbols. The word upwind is in the top left corner.

We are excited to announce a significant new capability in the Upwind Cloud Security Platform – threat detections for malicious file-based activity. Upwind’s threat detection and response capabilities have always allowed customers to detect and respond to threats in real time, powered by our innovative eBPF-based sensor. With this new capability, Upwind’s threat detection capabilities […]