Deceptions Everywhere ®

Insights on threat and cyber risk trends, use cases for deception technology
and strategies for combatting targeted attacks

MITRE ATT&CK Framework - How Illusive Foils Attacker Decision-Making

Posted by Matan Kubovsky on Nov 1, 2019 1:18:19 PM

UPDATE - Since this post was first published, MITRE has issued a technical white paper fully endorsing the implementation of Deception Technology. Download the report, entitled The Cyberspace Advantage: Inviting Them In 

For a cyber attacker, every organization is a potential target. Attack frequency and degrees of severity vary with the attacker's skill level, the assets they want, choice of tactics, and the sophistication of their targets' defenses. With attacks constantly in the headlines, it's no wonder security teams might feel overwhelmed. But in reality, not all threats are equal. Not all threats are relevant to all organizations. And not all threats are known.

Read More

Cyber Attack on Telecom: A Deception Technology Case Study.

Posted by Gily Netzer on Jun 7, 2017 8:00:00 AM

Attackers targeted a large telecom company with thousands of IT devices in its international network and data centers. They managed to compromise a field technician’s laptop through a malicious email attachment, but illusive networks’ Deceptions Everywhere® technology detected it.

Read More

Stay up to date!