Logo of Acalvio, a leading company in cyber deception technology

Deception in Depth: Mitigating Internal Attacks – Acalvio

Recently, an interesting survey pointed out that malware attacks are going fileless.  In some cases, this means even using an internal employee to help with the process. For example, the attack on the Bank of Bangladesh and you quickly realize that advanced attackers...
The Industry’s First “Deception 2.0 for Dummies” Book

The Industry’s First “Deception 2.0 for Dummies” Book

Since the dawn of time, deception has been used in nature in various forms as a successful survival strategy and has played an important role in the physical and behavioral adaptations of all organisms. Humankind, with its higher cognitive ability, has successfully...
Looking Deeper into a Multi Stage Attack

Looking Deeper into a Multi Stage Attack

The majority of today’s breaches are comprised of sophisticated multi-stage attacks.  The stages of such attacks can best be described by a “Cyber Kill Chain”, which breaks down cyber intrusions into the following steps:  Recon  → Weaponize → Deliver → Exploit →...
Loading...