-
Acalvio ShadowPlex for MITRE Shield

[et_pb_section fb_built=”1″ _builder_version=”3.22″][et_pb_row _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.4.8″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” hover_enabled=”0″] MITRE recently announced the first release of Shield MITRE recently announced the first release of Shield (https://shield.mitre.org/), an active defense knowledgebase on how to defend and engage with adversaries. The knowledgebase is a significant endorsement to Cyber Deception as […]
-
Fact: Latest Ransomware Can Bypass AV/EPP/EDR Solutions

[et_pb_section fb_built=”1″ admin_label=”section” _builder_version=”3.22″][et_pb_row admin_label=”row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.4.8″] Ransomware attacks have become an easy approach for cybercriminals Ransomware attacks have become an easy approach for cybercriminals to target businesses of all sizes b transcending industry types and geographies. There has been a marked transition in ransomware targets, moving away […]
-
The Wide-Ranging Implications of the CCPA-11.20.2019

The California Consumer Privacy Act, or CCPA, goes into effect on Jan. 1, 2020. Most mid-sized companies still have no clue about this data privacy legislation or how it will impact their business operations. Webll dig into this topic a bit, but recognize that we are not lawyers, and we donbt provide legal advice. Consider […]
-
Hacking Back With The Active Cyber Defense Certainty Act

H.R. 3270 …also known as the Active Cyber Defense Certainty Act (ACDC), will, if it becomes law, allow victims of hacking to execute self-defense outside of their networks. The essence of this bill was originally introduced in 2017 as H.R. 4036, which subsequently died in committee. Now it is back with new sponsorship and seems […]
-
Not all Anomalous Behavior is Malicious – Not all Malicious Behavior is Anomalous!

Malicious behavior: we generally know it when we see it Most of the time, unfortunately, malicious behavior is hidden from view. Consider that the average dwell time for cyberattackers within networks is still measured in months. Per FireEye, the global median dwell time in 2018 was 78 days, down from 101 days in 2017, but […]
-
Carbanaks War Against Financial Institutions – Deception Can Help

[et_pb_section fb_built=”1″ _builder_version=”4.4.8″][et_pb_row _builder_version=”4.4.8″][et_pb_column type=”4_4″ _builder_version=”4.4.8″][et_pb_text _builder_version=”4.4.8″ hover_enabled=”0″] Carbanak has been at war with financial institutions for about five years now We expect this war to continue and escalate. Carbanak is, of course, the devastatingly powerful banking trojan that has plagued financial institutions since approximately 2014. Carbanakbs primary attack vector via phishing email is just […]
-
Protecting Industrial Control Systems From Cyber Attack – The Three Great Myths

[et_pb_section fb_built=”1″ _builder_version=”4.4.8″][et_pb_row _builder_version=”4.4.8″][et_pb_column type=”4_4″ _builder_version=”4.4.8″][et_pb_text _builder_version=”4.4.8″ custom_margin=”||||false|false”] The Threat to ICS in Context Industrial control systems (ICS) are the key infrastructure targets for nation-state attackers and fringe bad actors seeking to compromise or destroy public utilities and manufacturing industry operations. In some cases simple tools such as ransomware are deployed against this industrial infrastructure, […]
-
The Great Coronavirus Deception

[et_pb_section fb_built=”1″ _builder_version=”4.4.8″][et_pb_row _builder_version=”4.4.8″][et_pb_column type=”4_4″ _builder_version=”4.4.8″][et_pb_text _builder_version=”4.4.8″] The Current Corona Virus Crisis We are all very much aware of the current Coronavirus crisis. Of course, all of us want information on the virus and constantly reach out for news and updates. Cyber attackers have taken advantage of this and responded with a virtual barrage of […]
-
Deception Technology is the Highest Accuracy Security Control You Can Buy

-
Deception Technology and SWIFT

[et_pb_section fb_built=”1″ _builder_version=”4.4.8″][et_pb_row _builder_version=”4.4.8″][et_pb_column type=”4_4″ _builder_version=”4.4.8″][et_pb_text _builder_version=”4.4.8″] Deception Technology – Locking Down Banking and the SWIFT Network Over the past several years, banks using the Society for World Interbank Financial Telecommunication (SWIFT) financial network have continued to be the victim of ongoing cyber attacks. This is not to say that the SWIFT network has any […]