Achieve Deeper Runtime Threat Investigation with Upwind Detection Logs 

A graphic with the Upwind logo in the top left corner shows rows of rounded rectangles in shades of blue and purple. A bright pink bar with a warning symbol appears in the center.

Imagine a threat appears, vanishes, and then reappears two days later – same process, slightly different path. Without the right visibility, you’d treat it like a new incident each time. But with Upwind Detection Logs, you get the historical context to see the full picture. Upwind provides deep runtime visibility and security across all environments, […]

Streamline Cloud Threat Detection and Response with Upwind’s Major Threats Module Enhancements

Pink, yellow, and red circles with shield and gear icons are scattered across a white background. The word upwind is in the top left corner. One central red circle is prominently highlighted.

Cloud security teams are drowning in alerts, struggling to prioritize real threats among endless notifications. To help security professionals cut through the noise, we are thrilled to announce major enhancements to our Threats Module, further empowering security professionals to understand deep context for every threat detection, identify emerging threat actors, and respond to threats faster.  […]

Introducing New Runtime Security Features for Modern Containerized Environments

Abstract pink and red circular design with a small shield icon containing a white virus symbol at the center. The image has a modern, minimalist style, accompanied by the text upwind in the top left corner.

At Upwind Security, we continuously enhance our security capabilities to address emerging threats and provide unparalleled runtime protection for containerized environments. In this update, we are excited to introduce new detection and prevention policies designed to secure workloads against sophisticated attacks.  Next-Generation Threat Detections Over the past several weeks we have added additional detection policies […]

Detect & Respond to Advanced Cloud Threats with Upwind

A diagram features a central purple circle with six arrows pointing outward to red circles containing icons: a lock, computer screen, fishing hook, smartphone, Bitcoin symbol, and stacked rectangles. The word upwind is at the top left.

Upwind’s next-generation cloud security platform not only provides real-time risk analysis and threat detection, it also gives you the ability to respond to threats in real time.  In this article, we will dive deep into how Upwind detects threats in real time, our advanced methods of  activity-based threat detection, and ways you can stop or […]

Cloud Heist: How Hackers Lock Accounts and Drain Wallets

Futuristic graphic featuring a glowing cloud icon at the center of a circular dial with measurement markings. The background has a gradient of blue and gray tones, with the word Upwind in the top right corner.

Cloud environments have changed how organizations manage their infrastructure, offering flexibility and scalability. But these benefits also bring new risks, and even small mistakes in cloud security can have serious consequences. For example, Google Cloud once accidentally deleted data from a $125 billion Australian pension fund due to a simple configuration error. Although this wasn’t […]

How Adversaries Use Telegram to Evade Detection

A pink and white sunburst pattern with a central white paper airplane icon in a pink circle. The top left corner has the text upwind in black.

In recent years, there has been a significant increase in adversaries exploiting popular messaging apps such as Telegram, Discord, Signal, and others to conceal their malicious activities. Among these platforms, Telegram stands out due to its robust security features, including end-to-end encryption and anonymous account creation, making it a go-to tool for cybercriminals. Overview Most […]

Understanding File-Based Attacks

Illustration of bees on a vibrant honeycomb pattern. Some cells are highlighted in red with alert symbols, suggesting danger or anomaly. The Upwind logo is visible in the top right corner.

File-based attacks are a growing concern in cybersecurity. These attacks involve tampering with files to gain unauthorized access, steal information, or cover up malicious activities. In this post, we’ll break down what file-based attacks are, look at some real-world examples, and walk through a typical attack scenario. What Are File-Based Attacks? File-based attacks exploit how […]

Enhance Your Threat Detection Capabilities with Custom Policy Scope 

A pattern of shields with check marks, mostly in light purple, fills the background. One shield in the center stands out in a darker purple. The word upwind is in the top left corner in black and pink.

We are excited to announce a significant new capability, giving you the ability to customize threat detection policy scope in the Upwind platform. Upwind has always provided powerful out-of-the-box threat detection policies based on predefined attack vectors, ensuring real-time threat detection. With this new capability, Upwind provides even more customization to fit your unique infrastructure […]

How Organizations Use Upwind’s File-Based Threat Monitoring

Illustration of bees on flowers with petal-shaped icons, representing various apps and notifications, surrounding each bee. The word upwind is at the top center. The design is repetitive, with five flowers spread across the image.

Upwind’s threat detection capabilities give you real-time protection against cloud attacks, including malicious file activities. Upwind’s lightweight, high-performance eBPF sensor goes beyond monitoring file activities to enrich that data with information about an event’s context and provide insights into the actions taken on the file, including read, write, and truncate (delete).  You can leverage this […]

Power Your Cloud Security with Software Development Lifecycle (SDLC) Context

A graphic with a central rocket icon surrounded by four smaller icons: a user, a wrench, a scanning symbol, and an exclamation mark, all connected by arrows. The upwind logo is in the top left corner.

We are excited to introduce a new capability that enables you to bring-your-own version control system to the Upwind platform – which integrates rich context from pull requests and build-time activities directly into our cloud infrastructure security platform.  Upwind offers unprecedented end-to-end visibility of your cloud infrastructure and applications, marrying intelligence from both build time and […]