Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.
Highlights.
-
The United States National Security Agency (NSA) issued a Cybersecurity Advisory on a recently discovered use of Living Off the Land Binaries (LOLBins) techniques by Volt Typhoon to evade detection by EDR, XDR and SIEM solutions. CounterCraft’s deception technology alerts on LOLBins automatically—and we ran a test this week to prove it. Read more
-
EDR—the cybersecurity solution that is a vast improvement over mere endpoint protection and anti-virus solutions….right? Well, there is one small hitch—EDR is a reactive approach. EDR tools function on a reliance of behavioral analysis, meaning the attacks have already happened and now your team has to race against time to remediate them. EDR avoidance is… Read more
-
Everybody is doing it—threat hunting, that is. 88% of CISOs and IT Managers believe that threat hunting is rapidly becoming essential and are including it as part of their cybersecurity strategy. Many organizations have realized, traditional defense mechanisms just aren’t enough and need to shift their security defense approach towards a more proactive defense. As… Read more
-
According to Gartner, Automated Moving Target Defense (AMTD) solutions will replace at least 15% of traditional detection and response solutions by 2025. That’s a big increase considering these solutions currently make up only 2% of detection and response market share. What exactly is AMTD? And, more importantly, why are organizations starting to implement it? Take… Read more
-
Categories: Threat Intelligence
A major embarrassment, at best, and a national security threat at worst. The recent case of a 21-year-old Air National Guardsman charged with leaking top-secret U.S. documents shares at least one thing with another famous leaker Edward Snowden: They both worked in government tech support. Insider threat is one of the most difficult threats to… Read more
-
Categories: Cybersecurity Trends
Cybersecurity News May Edition. Click through to find out what our team of experts was reading and talking about this month. Read more