Deceptions Everywhere ®

Insights on threat and cyber risk trends, use cases for deception technology
and strategies for combatting targeted attacks

What Do Attackers Really Want? Answer: Your Credentials!

Posted by Ofer Israeli on Jun 27, 2019 11:40:37 AM

You're vulnerable. And cyber attackers know it.

Read More


A Deception Technologist's View of Cloud Security

Posted by Beth Ruck on May 22, 2019 2:47:12 PM

As I sat down to write this post, I couldn’t help amusing myself with yet another corny “cloud” analogy: The potential for lateral movement between different parts of the extended corporate ecosystem is a bit like all the different types of lightening there are. If, besides being a tech geek, you are also a weather geek, you can read about lighting here. Among other things, this site explains that “Anvil Crawlers are horizontal tree-like, in-cloud lightning discharges whose leader propagation is slow enough… that a human observer… can see its rapid motion across the sky.” Where cloud security is concerned, Illusive’s aim is to make malicious lateral movement to, from, and between clouds slow and visible to the human eye—so that security teams can stop cyberattacks before a successful strike.

Read More


2019 Cyberthreat Defense Report: Five Findings

Posted by Jason Silberman on Apr 30, 2019 11:26:17 AM

The CyberEdge Group recently released its 2019 Cyberthreat Defense Report (CDR), capturing the current perceptions of IT security professionals from 17 countries, 6 continents, and 19 industries. The report­­­­­­­­­­­­­­­­­­­, co-sponsored by Illusive, delivers unique insight into their views of cyberthreats, current defenses, and planned security investments.

Read More


LockerGoga, A Ransomware Attack, Shows the Need for Cyber Hygiene

Posted by Jason Silberman on Apr 9, 2019 7:14:35 PM

Spring is here, and with it comes news of a new and vicious ransomware attack, known as LockerGoga.

Read More


How Cyberattackers Use Privileged Credentials to Establish Domain Persistence?

Posted by Beth Ruck on Mar 21, 2019 5:22:27 PM

The top risk cyberattackers face is the risk of getting caught. But executing an attack is typically a labor-intensive process. Attackers also worry that the access they’ve worked so hard to establish might suddenly get cut off if a password gets changed or an account they’re using is retired or removed from the domain.

Read More


Vulnerability Management: 3 Questions That Will Help Prioritize Patching

Posted by Jason Silberman on Feb 25, 2019 4:06:52 PM

Let’s tackle a familiar, yet daunting problem for vulnerability management (VM) teams: The patching “to-do” list in most organizations is so long that having some way to prioritize patching of networked endpoints, servers and other assets is essential for limiting exposure to cyberattacks.

Read More


Stay up to date!