-
Lateral Movement analysis of Zealot Campaign and its detection by Distributed Deception Architecture.

Acalvio Threat Research Labs Web Servers are becoming one of the entry vectors in breaches. In theB last blog,B I had shared the details of deception based architecture to prevent breaches involving web server as an entry vector. In this blog, we takeB Zealot campaign as a case study to show the effectiveness of deception […]