Blog  

The latest in cybersecurity and deception technology.

Subscribe for updates—fresh insight delivered to your inbox.

Analysis of an Emotet infection via a malicious Excel macro

READ MORE

Browse By Category

Select a category to see more related content


Recent Articles

5 May

{INFOGRAPHIC} The Anatomy of a Cyber Attack

READ MORE

All cyber attacks, no matter how complex, share a similar DNA, and deception technology has an answer for nearly every attack stage. Check out our breakdown of a typical cybersecurity incident.

4 May

A Peek at New Capabilities in MITRE ATT&CK Version 9

READ MORE

Our team has been a fan of the MITRE ATT&CK framework since the beginning. Every time there is a new update, we eagerly analyze the changes and incorporate the new features into our solution.

30 Apr

What We're Reading

READ MORE

April saw some interesting news from cyber criminals. Read on to find out what set our team’s wheels spinning with defense innovations this month. Ransomware Gang Threatens Pain on the Stock Market Recently, in a new tactic to put pressure on cyber attack victims, ransomware attackers have expanded their extortion tactics with a new technique aimed at companies that are listed on NASDAQ or other stock markets.

28 Apr

The Anatomy of a Cyber Attack

READ MORE

When you break down a cyber attack, you find patterns and actions that are commonplace. Every cyber attack consists of various stages, from pre-breach to the moment of impact.

22 Apr

Why Threat Intel is Broken

READ MORE

As a security analyst, we’ve all been there before. You’re getting ready for work, scroll the news, and notice that a new breach was discovered at a company that’s not even in your industry.

Page 31 of 57

Top Videos

SEE ALL

Cyber Deception for Insider Theats

Cyber Deception for Insider Theats

GET IT NOW

What is Deception Technology?

READ THE GUIDE