Tag: detection

  • Three Minutes Until the Apocalypse

    Three Minutes Until the Apocalypse

    [et_pb_section fb_built=”1″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_row _builder_version=”4.7.0″ _module_preset=”default”][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text admin_label=”This blog covers three main topics:” _builder_version=”4.7.0″ _module_preset=”default”]This blog covers three main topics: Three Key Questions Needing Answers Within Three Minutes When You Suspect a Breach Using Deception and Endpoint Logs to Backtrack Command and Control Improving SOC Triage Workflow with Prevention Failure Detection [/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_4,3_4″ […]

  • Ransomware: Catch me if you can.

    Ransomware: Catch me if you can.

    Ransomware demand in 2016 was around a billion dollars[1]. B WannaCry[3] was the recent ransomware campaign that spread across 150 countries affecting 200,000 users. It is estimated that in 2017[2], damages due to ransomware will exceed $5 billion. Modern defenses make use of virtualized environments or machine learning algorithms to ensnare the threat actor.B This […]

  • The Industrybs First bDeception 2.0 for Dummiesb Book

    The Industrybs First bDeception 2.0 for Dummiesb Book

    Since the dawn of time,B deception has been used in nature in various forms as a successful survival strategy and has played an important role in the physical and behavioral adaptations of all organisms.B Humankind, with its higher cognitive ability, has successfully adapted deception to warfare, as a powerful mechanism toB draw an enemy into […]

  • WannaCry Ransomware Analysis: Lateral Movement Propagation

    WannaCry Ransomware Analysis: Lateral Movement Propagation

    Acalvio Threat Research Labs The WannaCry ransomware attack has made front page news around the world, with at least 150 countries and 200,000 customers affected [2]. Because WannaCry makes use of a largely unpatched Windows exploit for lateral movement, it is able to spread rapidly once it penetrates an organizationbs network. In this blog we […]

  • How to outfox Shamoon? Put Deception to work!

    How to outfox Shamoon? Put Deception to work!

    Acalvio Threat Labs Shamoon is one of the critical threats that has been able to penetrate traditional defenses successfully not once, twice, but thrice – in 2012, 2016 and 2017. B The main purpose of Shamoon Threat Actor was the destruction of the endpoint computers by wiping the Master Boot Record (MBR), rendering them unusable. […]

  • Honeypots are dead. Long live honeypots…

    Honeypots are dead. Long live honeypots…

    Hi, I’m the resident hacker. These are thoughts from that point of view. Early Honeypots were not much of a success. This was deception fail, call it Deception 1.0b&It was a great idea, good science experiment, but ultimately didn’t stop much…and was not the honeypot that kept the likes of me out of your environment….. […]