<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=725552337608854&amp;ev=PageView&amp;noscript=1">

A Game Between Adversary and Defender

Posted by Satnam Singh on Mar 1, 2018 10:25:23 AM

The motivation for this blog is a question that has been circling in my head for a long time, and I have asked this question to many security analysts: Have they played a game with an adversary? or in other words - Have they engaged with an adversary?

Read More

Topics: deception, analyst, AI

WannMine - Lateral Movement Techniques

Posted by Acalvio Threat Research Labs on Feb 23, 2018 3:27:54 PM


Read More

Topics: security, worm, distributed deception

Technical Analysis of Samsam Ransomware. 

Posted by Abhishek Singh on Jan 24, 2018 10:11:36 PM


Read More

Topics: ransomware, malware, distributed deception

Ransomware Command and Control Detection using Machine Learning

Posted by Satnam Singh on Jan 15, 2018 9:13:52 PM

Authors: Deepak Gujraniya, Mohammad Waseem, Balamurali AR, and Satnam Singh

Read More

Topics: deception, ransomware, AI

Lateral Movement analysis of Zealot Campaign and its detection by Distributed Deception Architecture.

Posted by Acalvio Threat Research Labs on Jan 12, 2018 10:10:37 PM

Acalvio Threat Research Labs

Read More

Topics: ransomware, web server

Deception Centric Architecture to prevent Breaches involving WebServer.

Posted by Abhishek Singh on Dec 11, 2017 9:09:51 AM


Read More

Topics: deception, distributed deception, web server

Beyond the Hype: AI in Information Security

Posted by Satnam Singh on Dec 7, 2017 6:02:00 AM

In the next few years, Artificial Intelligence (AI) will transform and expand as a decision engine across every enterprise business layer from product development to operations to finance to sales. While, internet biggies like Google, Facebook, Microsoft and Saleforce are already embedding AI into their products, the Information Security (InfoSec) industry is also catching up to leverage AI in InfoSec. Almost every InfoSec vendor is claiming to have AI in their product. This makes it difficult for end-user organizations and they need to evaluate the AI capabilities of multiple vendors. A recent Gartner report by Whit Andrews and Jim Hare [1] raised this concern and provided a well-reasoned set of guidelines to help end-user organizations validate the AI claims made by vendors.

Read More

Topics: infosec, AI

Lateral Movement of Emotet

Posted by Abhishek Singh on Dec 4, 2017 1:14:18 PM

Acalvio Threat Research Labs.

Read More

Topics: lateral movement, malware, spreading techniques, information stealing

CSO Magazine Names ShadowPlex One of Best Security Products

Posted by Rick Moy on Nov 30, 2017 4:39:00 AM

CSO Magazine has named Acalvio's ShadowPlex as one of the best security products of the year

Read More

Topics: deception, awards, security products

Technical White Paper : Using Deception to Detect Spreading Techniques

Posted by Abhishek Singh on Nov 22, 2017 10:47:42 AM

The severity of any infection will get multiplied when it employs spreading technique. Ransomware which has been one of the critical threat for quite some time have been able to increase its effect by spreading to the mapped and unmapped drive. In the recent past threat actors have made use of remote code execution (such as WannCry), harvesting credentials from memory (such as Petya ,Shamoon), harvesting email addresses from the address book to spread inside the network.

Read More

Topics: deception, lateral movement, spreading techniques

Subscribe to Email Updates