<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=725552337608854&amp;ev=PageView&amp;noscript=1">

Deception Centric Architecture to prevent Breaches involving WebServer.

Posted by Abhishek Singh on Dec 11, 2017 9:09:51 AM


 

Read More

Topics: deception, distributed deception, web server


Beyond the Hype: AI in Information Security

Posted by Satnam Singh on Dec 7, 2017 6:02:00 AM


In the next few years, Artificial Intelligence (AI) will transform and expand as a decision engine across every enterprise business layer from product development to operations to finance to sales. While, internet biggies like Google, Facebook, Microsoft and Saleforce are already embedding AI into their products, the Information Security (InfoSec) industry is also catching up to leverage AI in InfoSec. Almost every InfoSec vendor is claiming to have AI in their product. This makes it difficult for end-user organizations and they need to evaluate the AI capabilities of multiple vendors. A recent Gartner report by Whit Andrews and Jim Hare [1] raised this concern and provided a well-reasoned set of guidelines to help end-user organizations validate the AI claims made by vendors.

Read More

Topics: infosec, AI


Lateral Movement of Emotet

Posted by Abhishek Singh on Dec 4, 2017 1:14:18 PM


Acalvio Threat Research Labs.

Read More

Topics: lateral movement, malware, spreading techniques, information stealing


CSO Magazine Names ShadowPlex One of Best Security Products

Posted by Rick Moy on Nov 30, 2017 4:39:00 AM


CSO Magazine has named Acalvio's ShadowPlex as one of the best security products of the year

Read More

Topics: deception, awards, security products


Technical White Paper : Using Deception to Detect Spreading Techniques

Posted by Abhishek Singh on Nov 22, 2017 10:47:42 AM


The severity of any infection will get multiplied when it employs spreading technique. Ransomware which has been one of the critical threat for quite some time have been able to increase its effect by spreading to the mapped and unmapped drive. In the recent past threat actors have made use of remote code execution (such as WannCry), harvesting credentials from memory (such as Petya ,Shamoon), harvesting email addresses from the address book to spread inside the network.

Read More

Topics: deception, lateral movement, spreading techniques


Three Minutes Until the Apocalypse

Posted by John Bradshaw on Nov 7, 2017 6:28:00 AM


 This blog covers three main topics:

    • Three Key Questions Needing Answers Within Three Minutes When You Suspect a Breach
    • Using Deception and Endpoint Logs to Backtrack Command and Control
    • Improving SOC Triage Workflow with Prevention Failure Detection
Read More

Topics: deception, detection, breach, siem, SOC, analyst


Enterprises Seeking Cyber Deception Solutions - Find Acalvio Listed in rFindery’s Cybersecurity Marketplace

Posted by Admin on Nov 6, 2017 7:32:34 AM


Deception is a rapidly growing market and within the expansive market are a plethora of vendors to choose from as you and your team find a vendor to fit your deception security needs.

Read More

Topics: deception, distributed deception


Spreading Technique used by Retadup Worm.

Posted by Abhishek Singh on Oct 2, 2017 8:42:45 PM


Acalvio Threat Research Lab

Read More

Topics: deception, worm, distributed deception, crypto


Can We Automate Threat Hunting?

Posted by Satnam Singh on Sep 21, 2017 8:35:12 AM


Threat hunting has been primarily a playground for security experts to surface unknown threats. It is a proactive security approach where the hunt starts with a hypothesis about a hidden threat that may be already in the enterprise network. According to 2017 survey on threat hunting by the SANS Institute, nearly 45% of organizations hunt on an ad hoc basis. The ad hoc approach is ineffective and does not yield sufficient results to cover the cost of threat hunting. Considering a limited number of security analysts, the ad hoc threat hunting becomes a costly and expensive process. Also, threat hunting is typically performed by doing outlier detection of the data. For example, analysts typically do outlier detection to find suspicious processes out of Windows process logs. The outlier detection can be done using simple box plots, control charts or using more sophisticated unsupervised machine learning techniques. However, the output of all the outlier detection techniques is outliers/anomalies that still need to be audited/investigated by the security analysts. This adds more workload to the already overwhelmed security analyst.

Read More


Deception Centric Defense Against Ransomware

Posted by Abhishek Singh on Aug 7, 2017 2:32:19 PM


Team Acalvio

Read More

Topics: deception, ransomware


Subscribe to Email Updates