Deceptions Everywhere ®

Insights on threat and cyber risk trends, use cases for deception technology
and strategies for combatting targeted attacks

What Do Attackers Really Want? Answer: Your Credentials!

Posted by Ofer Israeli on Jun 27, 2019 11:40:37 AM

You're vulnerable. And cyber attackers know it.

Read More


2019 Cyberthreat Defense Report: Five Findings

Posted by Jason Silberman on Apr 30, 2019 11:26:17 AM

The CyberEdge Group recently released its 2019 Cyberthreat Defense Report (CDR), capturing the current perceptions of IT security professionals from 17 countries, 6 continents, and 19 industries. The report­­­­­­­­­­­­­­­­­­­, co-sponsored by Illusive, delivers unique insight into their views of cyberthreats, current defenses, and planned security investments.

Read More


LockerGoga, A Ransomware Attack, Shows the Need for Cyber Hygiene

Posted by Jason Silberman on Apr 9, 2019 7:14:35 PM

Spring is here, and with it comes news of a new and vicious ransomware attack, known as LockerGoga.

Read More


How Cyberattackers Use Privileged Credentials to Establish Domain Persistence?

Posted by Beth Ruck on Mar 21, 2019 5:22:27 PM

The top risk cyberattackers face is the risk of getting caught. But executing an attack is typically a labor-intensive process. Attackers also worry that the access they’ve worked so hard to establish might suddenly get cut off if a password gets changed or an account they’re using is retired or removed from the domain.

Read More


Stay up to date!