Loading
Author: Oleg Poligenko, Chief Information Security Officer (CISO) at Nova Digital (Nova Group) In the modern world of cyber threats, traditional methods of data protection are becoming less effe...
The Labyrinth team is honored to announce cooperation with the USAID Cybersecurity for Critical Infrastructure in Ukraine Activity, which aims to develop a new module to extend the Deception Platfo...
Every solution, regardless of its sophistication or purpose, inherently carries risks, including the potential for vulnerabilities. These risks can undermine user trust and compromise both personal...
One of the most frequently asked questions we get at support, when working with clients and partners, is how to choose which kinds of Points (network decoys in Labyrinth Deception Platform) to util...
While deception in our everyday lives is often associated with trickery, lies, and subterfuge, it has found its role in modern cybersecurity practices and approaches. In its core, cyber decept...
Via NSA and CISA Red and Blue team assessments and through the activities of NSA and CISA Hunt and Incident Response teams, the agencies specified the following ten most typical network misconfig...
We selected the most valuable ideas from Threat Research Report “Russia's Cyber Tactics: Lessons Learnt in H1’2023” and wanted to share them with those interested in modern ...
What is MITRE ATT&CK®? MITRE ATT&CK® is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base i...
What is OWASP® CRS? The Open Worldwide Application Security Project® (OWASP) is a nonprofit foundation that works to improve software security. One of many OWASP’s projects is Core...
Today we want to share some thoughts regarding the Security operations center (SOC)’s role in your cybersecurity strategy. While examining Gartner’s “Tips for Selectin...
Recently, the IS community was rocked by news about a new tool that could easily bypass Endpoint Protection systems and disable more than twenty cybersecurity solutions, including such giants as Mc...
ESXiArgs ransomware attacks are known for targeting VMware ESXi servers worldwide, which is currently one of the most crucial cybersecurity issues. As a vast number of companies around the world w...
Quite often, aiming to speed up the process of deploying their IS system, companies may be tempted to start deploying a SIEM as its foundation without a pre-developed tactic and strategy for its us...
Please read our latest case study to discover how our customer, a pharmaceutical company, was able to protect their IT assets and catch adversaries with the Labyrinth Deception Platform. Summary...
Log4j (also known as Log4Shell) vulnerability is one of the most viral cybersecurity issues of 2021, which is still a great pain point for the world IT community. Log4j was initially released mo...
The importance of active defense and key role of cyber deception in active defense were emphasized by Mitre Corporation in its MITRE Shield - a publicly available knowledge base on the methods and ...
The Summary of Findings in the recently published 2021 Data Breach Investigation Report shows that Web Applications Attack is the second most commonly used approach leading to both, breaches, and i...
To enrich security alerts generated by Labyrinth Deception Platform, our team has developed a deep integration with one of the most popular and functional SIEM systems – IBM QRadar. This two-...
Always good to know that your solution is efficient and deliver significant value to customers! In this blogpost we described several real-world use cases of Labyrinth Deception Platform, from one ...
One of the biggest recent news in the IT field was the disclosure of information about four critical vulnerabilities in the Microsoft Exchange mail server at once. Moreover, these vulnerabilities h...
Read our latest case study to get to know how our customer, Polygraph Combine "Ukraina”, was able to ensure the protection of their IT network, with a security perimeter eroded by remote...
Comparison of two approaches to simulations implementation in Deception solutions: Full OS vs OS/Service emulation Many IS professionals unequivocally state that Deception systems ar...