Category: Blog

  • Dynamic Deception to address GDPR compliance

    Dynamic Deception to address GDPR compliance

    GDPR & Deception

  • Using Deception to Detect and Profile Hidden Threats

    Using Deception to Detect and Profile Hidden Threats

    Author: Satnam Singh,B Chief Data Scientist at Acalvio Technologies How do we detect and profile the adversaries who have already infiltrated and are hiding in the network? To answer this question, we need an approach that can improve the detection and provide more visibility. At Acalvio, we have developed a system that leverages the deception […]

  • Rise Above the Fray with The NIST Cybersecurity Framework

    Rise Above the Fray with The NIST Cybersecurity Framework

    Being a CISO these days isnbt easy. The threats are dynamic, the technology hype bewildering, and the expectations from the boss to magically bjust make the problem go awayb unrelenting. One way to help get a grip on this mess is to adopt industry accepted frameworks in which to operate. The idea is to step […]

  • Lateral Movement Technique Employed by Hidden Cobra

    Lateral Movement Technique Employed by Hidden Cobra

    US-Cert recently issued notification regarding malicious cyber activity by the North Korean government [1] Hidden Cobra.

  • Lateral Movement Technique by Hidden Cobra Threat Actor

    US Cert recently issued notification regarding malicious cyber activity by the North Korean government [1] as Hidden Cobra. B There are two families of malware used by the North Korean Government. Remote Access Tool (RAT) known as Jonap A Server Message Block (SMB) worm called as Brambul worm. As per the report by US-Cert, threat […]

  • Using Deep Learning for Information Security – Part 1

    Using Deep Learning for Information Security – Part 1

    Balamurali A R andB SatnamB Singh – Post Web 2.0, data generated on the internet has increased manifold. This has led to the use of data driven approaches to solve many traditional problems across different industry verticals.

  • Deception Deployment Strategies : Threat Agnostic vs. Service Agnostic

    Deception Deployment Strategies : Threat Agnostic vs. Service Agnostic

    B In our previous blogs[1][2], we have shared details of detection of breach campaigns and worms by using Deception. A B Distributed Deception Platform (DDP) consists of the breadcrumbs and lures at the endpoint pointing to the honey services in the network. The DDP can be deployed in the network can be done in a […]

  • Detection of Breach Campaigns by using Distributed Deception

    Detection of  Breach Campaigns by using Distributed Deception

    Todaybs breaches are predominantly carried out in a series of sophisticated, multi-stage attacks. The stages involved in such an attack can best be described by a bCyber Kill Chain”. This, as per MITRE ATT&CK Adversary Tactic Model [11] breaks down cyber intrusions into the steps shown in the following figure. As discussed in the previous […]

  • Detection of Prevalent Threats by Distributed Deception

    Detection of Prevalent Threats by Distributed Deception

    Todaybs breaches are overwhelmingly carried out in a series of sophisticated, multi-stage attacks. The stages of such attacks can best be described by a bCyber Kill Chain,b which as per MITRE ATT&CK Adversary Tactic Model [1] breaks down cyber intrusions into the steps shown in figure 1.0.   B B B B B B B […]

  • A Game Between Adversary and Defender

    A Game Between Adversary and Defender

    The motivation for this blog is a question that has been circling in my head for a long time, and I have asked this question to many security analysts: Have they played a game with an adversary? or in other words – Have they engaged with an adversary? I got mixed responses. Many security analysts […]