Deceptions Everywhere ®

Insights on threat and cyber risk trends, use cases for deception technology
and strategies for combatting targeted attacks

Time for Spring Cleaning? LockerGoga Underscores the Need for Cyber Hygiene

Posted by Jason Silberman on Apr 9, 2019 7:14:35 PM

Spring is here, and with it comes news of a new and vicious ransomware attack, known as LockerGoga.

Read More


Can Cyberattackers Acquire Privileged Credentials to Replicate Your Entire Domain?

Posted by Beth Ruck on Mar 21, 2019 5:22:27 PM

The top risk cyberattackers face is the risk of getting caught. But executing an attack is typically a labor-intensive process. Attackers also worry that the access they’ve worked so hard to establish might suddenly get cut off if a password gets changed or an account they’re using is retired or removed from the domain.

Read More


Why Digital Forensics are Instrumental to Rapid Incident Response

Posted by Jason Silberman on Mar 14, 2019 5:20:26 PM

The practice of digital forensics in cybersecurity focuses on recovering and investigating artifacts found on devices to determine the nature of an incident or cyberattack.

Read More


Illusive Networks Turns 100

Posted by Ofer Israeli on Mar 5, 2019 3:19:30 PM

On February 13th, we broke out the hats and balloons (read: hummus and beer) to celebrate Illusive’s 100th software sprint. For 100 releases now, we’ve been helping our customers—hundreds of organizations across industries—revolutionize their ability to stop advanced cyberattackers.

Read More


Vulnerability Management: 3 Questions That Will Help Prioritize Patching

Posted by Jason Silberman on Feb 25, 2019 4:06:52 PM

Let’s tackle a familiar, yet daunting problem for vulnerability management (VM) teams: The patching “to-do” list in most organizations is so long that having some way to prioritize patching of networked endpoints, servers and other assets is essential for limiting exposure to cyberattacks.

Read More


Getting Ahead of HIPAA Requirements to Increase Overall Security

Posted by Guy Rosenthal on Jan 2, 2019 3:14:28 PM

HIPAA Compliance—Cyberattackers Aren’t Fazed

In spite of longstanding HIPAA compliance requirements, and the billions of dollars being invested to ensure HIPAA compliance, it seems that cyberthreats and attackers aren't fazed. Healthcare suffered from some of the largest breaches ever reported in 2015. The breach at Anthem compromised 78.8 million records, and two additional breaches exposed more than 10 million records each1. The following year, 2016, saw the highest number of breaches with 327 reported. The number of breaches in 2017 surpassed 2016, with more than 342 reported. While the number of breaches grew, the number of compromised records dropped from 112 million in 2016 to a little more than 14 million in 2017.

Read More


Stay up to date!