Using Deception to Detect and Profile Hidden Threats

Using Deception to Detect and Profile Hidden Threats

Author: Satnam Singh, Chief Data Scientist at Acalvio Technologies How do we detect and profile the adversaries who have already infiltrated and are hiding in the network? To answer this question, we need an approach that can improve the detection and provide more...
Rise Above the Fray with The NIST Cybersecurity Framework

Rise Above the Fray with The NIST Cybersecurity Framework

Being a CISO these days isn’t easy. The threats are dynamic, the technology hype bewildering, and the expectations from the boss to magically “just make the problem go away” unrelenting. One way to help get a grip on this mess is to adopt industry accepted frameworks...
Lateral Movement Technique Employed by Hidden Cobra

Lateral Movement Technique Employed by Hidden Cobra

US-Cert recently issued notification regarding malicious cyber activity by the North Korean government [1] Hidden Cobra.  There are two families of malware used by the North Korean Government. Remote Access Tool (RAT) known as Jonap A Server Message Block (SMB) worm...

Lateral Movement Technique by Hidden Cobra Threat Actor

US Cert recently issued notification regarding malicious cyber activity by the North Korean government [1] as Hidden Cobra.  There are two families of malware used by the North Korean Government. Remote Access Tool (RAT) known as Jonap A Server Message Block (SMB)...
Using Deep Learning for Information Security – Part 1

Using Deep Learning for Information Security – Part 1

Authors: Balamurali A R and Satnam Singh Post Web 2.0, data generated on the internet has increased manifold. This has led to the use of data driven approaches to solve many traditional problems across different industry verticals. Among them, deep learning-based (DL)...