8 Reasons Why Deception Technology Trumps Honeypots Every Time

Posted by Gily Netzer on May 25, 2017 7:45:07 AM

We see it every day. There’s a widespread misunderstanding about the differences between deception technology and the traditional honeypot method of detecting cyber attackers. Honeypot tactics and deception technology are significantly different—from their underlying basic premise to their levels of effectiveness. Here’s how they differ.

Read More

SANS Institute Reviews illusive networks Technology, Calling it a Game-Changer

Posted by Maureen McCormick on Apr 27, 2017 2:48:37 PM

Growing awareness of illusive networks Deceptions Everywhere™ technology recently led SANS Fellow, Dr. Eric Cole, to test our solution. Not only did he aim to successfully deceive an attacker, he also evaluated illusive’s scalability, manageability, and believability. The results of his (unsuccessful) efforts to attack a network and escape detection are contained in a new SANS Product Review - Deception Matters: Slowing the Adversary with illusive networks.

Read More

Spora Ransomware Detected and Stopped

Posted by Nir Greenberg on Mar 30, 2017 4:15:06 PM

On February 29, 2017 illusive networks received a customer alert and initiated forensic analysis after malicious activity was detected on a certain endpoint in the network. Our Deception Management System identified the malicious activity as Spora, a variant of ransomware, which like Locky, silently encrypts files with selected extensions and then attempts to redeploy itself on additional hosts via elevated privileges.  However, with Deceptions Everywhere deployed illusive networks diverted the ransomware from encrypting files on the original host - redirecting the encryption process to deceptive files - and more importantly thwarted the encryption of files located on the company's network shares. 

Read More

Stop Malicious Attacks.  Introducing Machine Learning Driven Cybersecurity.

Posted by Maureen McCormick on Feb 10, 2017 4:03:42 PM

Based on Ponemon Institute research, feedback from over 300 participating companies, the average total cost of a data breach increased from $3.79M to $4M and the number one root cause of data breaches was malicious or criminal attacks.  There are hundreds of other IT Security stats just as discouraging, but one thing is consistent across all of these studies; traditional prevention tactics are not enough.  Advanced attackers are relentless and their methods evolve faster than legacy technology.

What are the options?

Read More

RSAC 2017: Five Must-Dos at This Year's Big Event

Posted by Maureen McCormick on Feb 6, 2017 11:46:03 AM

Did you feel that rumble?  No, it wasn’t an earthquake.  There it is again.  It seems to be coming from the Moscone Center.  Wow, all the hustle and final preparations for the RSA Conference is certainly making a ruckus!

In one week, thousands of IT Security Professionals invade … I mean … travel to the City by the Bay looking to fulfill their cybertech hopes and dreams.  It’s the event where the greatest tech minds come together to network, teach and learn about new solutions.  And let’s not forget, it’s the event that has the best chachkies! 

RSAC 2017 is finally upon us!  Here are five things to keep in mind during the conference.  Enjoy!

Read More

Timeline Analysis Based on Time Stamped Forensics

Posted by Hadar Yudovich on Feb 2, 2017 2:49:35 PM

Hi Readers,

Welcome back to the second installment of our DFIR blog!  If you didn’t read Introduction to Digital Forensics and Incident Response check it out.  

Let’s get started on our next chapter, Timeline Analysis and Time Stamped Forensics.

A Chapter from Your Favorite Crime Novel

In one of his blog posts, Corey Harrell described timeline analysis as a "great technique to determine the activity that occurred on a system at a certain point in time".  When referring to DFIR, we would take it one step further: timeline analysis is necessary for effective incident response.

Read More

Get Email Updates

Deception Technology
  

> Share Post