Category: Blog

  • Enterprises Seeking Cyber Deception Solutions – Find Acalvio Listed in rFinderybs Cybersecurity Marketplace

    Enterprises Seeking Cyber Deception Solutions – Find Acalvio Listed in rFinderybs Cybersecurity Marketplace

    Deception is a rapidly growing market and within the expansive market are a plethora of vendors to choose from as you and your team find a vendor to fit your deception security needs. To help organizations find the right vendor for their infrastructure, companies can use rFinderybs cybersecurity marketplace to aid in making buying decisions. […]

  • Spreading Technique used by Retadup Worm.

    Spreading Technique used by Retadup Worm.

    Acalvio Threat Research Lab Retadup worm has been in the news recently. It was first observered infecting Israeli Hospitals [1] and recently it was observered active in South America mining for Crypto Currency[2]. The details of the worm have been published by Trend Labs[1][2].B This blog will share the spreading technique used by the worm […]

  • Can We Automate Threat Hunting?

    Can We Automate Threat Hunting?

    Threat hunting has been primarily a playground for security experts to surface unknown threats. It is a proactive security approach where the hunt starts with a hypothesis about a hidden threat that may be already in the enterprise network. According to 2017 survey on threat hunting by the SANS Institute, nearly 45% of organizations hunt […]

  • Deception Centric Defense Against Ransomware

    Team Acalvio It is estimated that in 2017, damages due to the ransomware will exceed $5 billion.[8]B When successful, ransomware can not only infect the endpoint, it can also spread across the network extending its exploit. The initial versions of ransomware like CryptoWall, CryptoFortess, DMA-Locker, CryptoLuck used mapped and unmapped drive for lateral movement. B […]

  • Meeting HIPAA Requirements with Acalviobs Deception 2.0 Solution, ShadowPlex

    Meeting HIPAA Requirements with Acalviobs Deception 2.0 Solution, ShadowPlex

    The recent ransomware attacks such as Wannacry have highlighted the need for robust security controls in healthcare firms.B These organizations are subject to HIPAA/HITECH compliance requirements, but unfortunately many firms just seem them as a distraction. B This is a big mistake: The controls typically implemented for HIPAA/HITECH shouldnbt be regarded as useless bcheck the […]

  • Donbt be a sitting duck. Make your BreadCrumbs & Lures Dynamic!

    Donbt be a sitting duck. Make your BreadCrumbs & Lures Dynamic!

    BreadCrumbs and Lures are very critical components of any deception based architecture. As the name suggests, breadcrumbs and lures aid to divert a threat a threat actor (an individual or malware) to deception sensors. The moment the deception sensor gets tripped, instead of blocking the multi-stage threat, the threat actor is allowed to execute its […]

  • Reflections on a conferenceb&

    This past week Ibve spent 30 hours in planes and countless more hanging around in security lines, Ibve been heated to the point of melting, tired to the point of sleeping while standing and stressed to the point of immobility (mostly my fault due to not getting all the slides finished until the last minute)b&and […]

  • Technical Analysis of Petya

    Acalvio Threat Research Labs   Petya is the most recent ransomware strain. It originated in Ukraine [1] and is spreading across Europe. This blog summarizes our technical analysis of Petya. Technical Analysis In addition to the encryption and ransomware functionality, the Petya malware has very B aggressive spreading capabilities. The dropper analyzed was a VB6 […]

  • Ransomware: Catch me if you can.

    Ransomware: Catch me if you can.

    Ransomware demand in 2016 was around a billion dollars[1]. B WannaCry[3] was the recent ransomware campaign that spread across 150 countries affecting 200,000 users. It is estimated that in 2017[2], damages due to ransomware will exceed $5 billion. Modern defenses make use of virtualized environments or machine learning algorithms to ensnare the threat actor.B This […]

  • The Industrybs First bDeception 2.0 for Dummiesb Book

    The Industrybs First bDeception 2.0 for Dummiesb Book

    Since the dawn of time,B deception has been used in nature in various forms as a successful survival strategy and has played an important role in the physical and behavioral adaptations of all organisms.B Humankind, with its higher cognitive ability, has successfully adapted deception to warfare, as a powerful mechanism toB draw an enemy into […]