Deceptions Everywhere ®

Insights on threat and cyber risk trends, use cases for deception technology
and strategies for combatting targeted attacks

Stop Cyberattackers by Stopping the Spread of Credentials

Posted by Gil Shulman on Apr 10, 2018 10:56:38 AM

With cyber risk an executive- and board-level concern, it's not enough to try to prevent attackers from gaining entry to your network. Advanced, persistent attackers can still get through even the most advanced defenses. Once they're in, they have the arduous task of moving from their initial point of entry to their ultimate target. This is the time when attackers are most vulnerable—and where we, as defenders, have an opportunity to tip the balance in our favor.

Read More


16 Key Takeaways from the 2016 Verizon Data Breach Investigations Report

Posted by Hanan Levin on Jun 21, 2016 12:30:51 AM

For 9 straight years now, Verizon has released the Data Breach Investigations Report to give cybersecurity professionals a detailed look into the threat landscape. The report is meant to help security teams keep up with increasingly sophisticated attackers. 

Read More


Top 5 Network Security Vulnerabilities Discovered by Attacker View™

Posted by Hanan Levin on Jun 13, 2016 2:31:42 AM

As one half of the illusive 3.0 solution, Attacker View™ gives companies an opportunity to see their unique vulnerabilities to information security threats. This provides an advantage that most organizations have yet to benefit from in the cybersecurity context.

Read More


Keeping Cyber Attackers in an Endless Maze with Deception Technology

Posted by Hanan Levin on Jun 9, 2016 12:16:40 AM

Cyber attackers only need one small crack in a security plan to invade and jeopardize an entire organization. As IBM and Ponemon Institute reported in their 2015 Cost of Data Breach Study: Global Analysis, this is becoming a costly problem for today’s businesses.

Read More


What Do Attackers Rely on If Not Zero-Day Exploits?

Posted by the Illusive Networks team on May 2, 2016 10:32:00 AM

Over the past few years, zero-day attacks, which target software flaws, have generally been thought of as being on the rise. In fact, studies have found that from 2014-2015, the number of zero-day vulnerabilities discovered have increased by 125%.  

Read More


A Look at Cybersecurity Vulnerabilities in the Cloud

Posted by the Illusive Networks team on Apr 12, 2016 2:30:33 AM

Based on a recent survey of over 1000 IT professionals from Evolve IP, half of all IT leaders and administrators, believe that the public cloud is less secure than on-premise hosting.

Read More


Stay up to date!