Blog
Deception Centric Architecture to prevent Breaches involving WebServer.
Web Server is becoming one of the critical vector which have been exploited by a threat actor to breach an organization. Breach at Equifax is one such example, affecting 143 million customers. In this breach, a threat actor could access the internal network and...
Beyond the Hype: AI in Information Security
In the next few years, Artificial Intelligence (AI) will transform and expand as a decision engine across every enterprise business layer from product development to operations to finance to sales. While, internet biggies like Google, Facebook, Microsoft and Saleforce...
Lateral Movement of Emotet
Acalvio Threat Research Labs. Introduction Emotet is one of many information stealer malware families which have been active in the recent months. The initial delivery vector of the malware is via phishing campaign. The blog by TrendMicro[1] and Microsoft[2] discusses...
CSO Magazine Names ShadowPlex One of Best Security Products
CSO Magazine has named Acalvio's ShadowPlex as one of the best security products of the year. CSO specifically cites Acalvio's ease of use and "unlimited deception assets without constant overhead or maintenance" as value added features. You may read the entire review...
Technical White Paper : Using Deception to Detect Spreading Techniques
The severity of any infection will get multiplied when it employs spreading technique. Ransomware which has been one of the critical threat for quite some time have been able to increase its effect by spreading to the mapped and unmapped drive. In the recent past...
Three Minutes Until the Apocalypse
This blog covers three main topics: Three Key Questions Needing Answers Within Three Minutes When You Suspect a Breach Using Deception and Endpoint Logs to Backtrack Command and Control Improving SOC Triage Workflow with Prevention Failure Detection An adversary has...
Enterprises Seeking Cyber Deception Solutions – Find Acalvio Listed in rFindery’s Cybersecurity Marketplace
Deception is a rapidly growing market and within the expansive market are a plethora of vendors to choose from as you and your team find a vendor to fit your deception security needs. To help organizations find the right vendor for their infrastructure, companies can...
Spreading Technique used by Retadup Worm.
Acalvio Threat Research Lab Retadup worm has been in the news recently. It was first observered infecting Israeli Hospitals [1] and recently it was observered active in South America mining for Crypto Currency[2]. The details of the worm have been published by Trend...
Can We Automate Threat Hunting?
Threat hunting has been primarily a playground for security experts to surface unknown threats. It is a proactive security approach where the hunt starts with a hypothesis about a hidden threat that may be already in the enterprise network. According to 2017 survey on...