Responder.py detection across an entire enterprise’s infrastructure, using MazeRunner
Thursday, September 14, 2017
Since our last blog post about MazeRunner’s Responder Monitor, we have improved it based on feedback from the ...
Using cyber deception to gain visibility and control of IoT devices
Thursday, August 31, 2017
Cyber deception is very effective in IoT security, although naturally there is a limit to that effectiveness. S...
Beyond PewPew: Building security visualization that matters
Thursday, August 24, 2017
With version 1.6 of Cymmetria’s MazeRunner, we released a new cyber deception visualization module. It’s not just ...
MazeRunner now supports SCADA, medical devices, IoT, VoIP, and other ICS and OT honeypots and decoys
Thursday, August 3, 2017
We are pleased to announce that Cymmetria’s MazeRunner now supports ICS and OT honeypots as part of its offering, ...
RDP replay: What if you could shoulder surf your attacker?
Wednesday, July 19, 2017
Below is a screenshot from a video (recorded by MazeRunner) that shows an attacker installing a bitcoin miner on a M...
Cymmetria hires leading expert on malware and Internet threats, Joe Stewart
Thursday, May 11, 2017
We are pleased to announce that as of this week, Joe Stewart (formerly with Dell SecureWorks for 17 years) has joi...
That's all i could find (for now)