Deceptions Everywhere ®

Insights on threat and cyber risk trends, use cases for deception technology
and strategies for combatting targeted attacks

Mitigating ATM Threats from the Inside Out

Posted by Beth Ruck on Jul 25, 2018 3:38:23 PM

 ATMs are literally boxes of cash—too good for criminals of any stripe to pass up. When ATMs first emerged, thieves used brute-force tools like crowbars, explosives, and propane torches to remove the ATM machine itself or get at the cash inside. As recently as April, three men were charged in Salt Lake City, UT, for trying to blow up ATMs and steal the cash. 

Read More


Our View on US CERT TA18-074A: A Critical, Missing Capability to Protect Critical Infrastructure from Targeted Attacks

Posted by Ofer Israeli on Mar 22, 2018 11:03:39 AM

On March 15, 2018, US CERT (U.S. Computer Emergency Readiness Team) issued a Technical Alert about “Russian government cyber actors” conducting a concerted cyberattack campaign against energy companies. Specifically, they gained access through small organizations connected to the target companies and then “conducted network reconnaissance, moved laterally, and collected information pertaining to Industrial Control Systems (ICS).”

Read More


Cyber Attacks Continue to Target SWIFT: The Globex Bank Incident Reminds Us of Urgent Actions to Prevent Fraud Losses

Posted by Matan Kubovsky on Dec 22, 2017 5:22:45 PM

As 2017 comes to a close, the string of recent attacks on SWIFT and other financial messaging systems are emerging as one of the main threat trends. News has just surfaced of another such attack – this time impacting Globex Bank in Russia, which took place on December 15th. Attackers apparently attempted to steal almost $1M by manipulating international transfer requests through the systems within the bank that connect to the SWIFT messaging service. 

Read More


Ransomware - Is Your Company the Next Blackmail Target?

Posted by Tom Sela on Jul 6, 2016 8:56:21 AM

Ransomware is the biggest topic in the cybersecurity community right now – but this certainly doesn’t mean it’s a new concept. Malware capable of encrypting files on infected machines has existed since 1989, but today’s cyber attacks are far more sophisticated.

Read More


Keeping Cyber Attackers in an Endless Maze with Deception Technology

Posted by Hanan Levin on Jun 9, 2016 12:16:40 AM

Cyber attackers only need one small crack in a security plan to invade and jeopardize an entire organization. As IBM and Ponemon Institute reported in their 2015 Cost of Data Breach Study: Global Analysis, this is becoming a costly problem for today’s businesses.

Read More


Why Attackers Know Your Network Better Than You Do

Posted by the Illusive Networks team on Apr 25, 2016 2:18:11 AM

 At this year’s inaugural Usenix Enigma security conference, crowds flocked to listen to an unconventional speaker.

Read More


Stay up to date!