Resources
Understanding Anomalous Behavior and Malicious Intent
Malicious behavior: we generally know it when we see it Most of the time, unfortunately, malicious behavior is hidden from view. Consider that the average dwell time for cyberattackers within networks is still measured in months. Per FireEye, the global median dwell...
Carbanaks War Against Financial Institutions – Deception Can Help
Carbanak has been at war with financial institutions for about five years now We expect this war to continue and escalate. Carbanak is, of course, the devastatingly powerful banking trojan that has plagued financial institutions since approximately 2014. Carbanak’s...
Guarding Industrial Systems: Debunking Three Cyber Myths
The Threat to ICS in Context Industrial control systems (ICS) are the key infrastructure targets for nation-state attackers and fringe bad actors seeking to compromise or destroy public utilities and manufacturing industry operations. In some cases simple tools such...
The Great Coronavirus Deception
The Current Corona Virus Crisis We are all very much aware of the current Coronavirus crisis. Of course, all of us want information on the virus and constantly reach out for news and updates. Cyber attackers have taken advantage of this and responded with a virtual...
Deception Tech: Top Accuracy Security Control – Acalvio
Deception Technology is the Highest Accuracy Security Control You Can Buy According to the 2019 Cisco CISO Benchmark Study, “the accuracy of the tools used to determine which alerts should be investigated are not doing their jobs.” According to the report, “24.1% of...
Deception Technology and SWIFT
Deception Technology - Locking Down Banking and the SWIFT Network Over the past several years, banks using the Society for World Interbank Financial Telecommunication (SWIFT) financial network have continued to be the victim of ongoing cyber attacks. This is not to...
Acalvio-Blog-Deception Technology and Bank ATM
Deception Technology - Protecting Your Bank’s ATM Infrastructure Cyber attacks on automated teller machines (ATMs) have been running at full throttle for years. With over 3 million units, the automated teller machine remains a highly accessible and attractive target...
Massive Breach Hit Diagnostic Lab in Healthcare
Massive Breach Hits Diagnostic Lab in Healthcare Yet another massive breach has impacted the health care industry this June with Quest Diagnostic’s disclosure that 11.9 million customers may have their personal identifiable information (PII) access in yet another high...
COVID-19: An Ounce of Prevention is Worth a Pound of Cure
What to do to get in front of today’s Corona-related threats Perhaps the hacker’s motto should be “Don’t Let a Good Crisis Go to Waste”.
The Most Dangerous Threats to the Cloud
The digital transformation has been powered by several factors, the most important of which is the rapid move to the cloud. It is estimated today that 90 percent of organizations utilize some type of cloud service and that 60 percent of organizations use cloud...
Ransomware Shuts Down Company
Ransomware as a Service (RaaS) Ransomware as a Service (RaaS) continues to threaten enterprises of all sizes. RaaS is provided by organized crime for other criminals to use. The primary software creator is responsible for fixing bugs, evolving the functionality of the...
EU Strong Customer Authentication
Strong Customer Authentication The requirement for Strong Customer Authentication (SCA) went into effect this past September. Notwithstanding the deadline, several countries announced a delay in implementation which was approved by the European Banking Authority...