Blog

Cyber deception – five years in

Five years in, cyber deception has changed everything in how we run security operations. There is nothing more ...

Powershell Black Magic

  If like us you’ve done some programming with Powershell, you know there are some gotchas in the language. ...

libssh CVE-2018-10933 Honeypot

Cymmetria research is releasing a honeypot for detecting the new libssh vulnerability discovered week ago on October 16th. ...

Using cyber deception to catch entrenched attackers

When we talk about deception, we usually talk about detecting and preventing an attacker from executing lateral movement ...

Cryptocurrency deception: Don’t trust that wallet!

Since cryptocurrency, blockchain, and smart contracts have been in the news quite a bit recently, we thought we’d ...

Deception and the SingHealth breach: the anatomy of an attack that could have been prevented

Personal data of 1.5 million SingHealth patients has been compromised in what is being described as Singapore's worst ...

General Data Protection Regulation and Deception Solutions

The GDPR is the European Union’s General Data Protection Regulation. Its main objective is to protect EU residents’ ...

Introducing caffeine deception

What is the most valuable asset in your organization? Code? Information? Servers? All of these are artifacts—just some ...

Cymmetria releases honeypot for Cisco ASA vulnerability (CVE-2018-0101)

Cymmetria has just released a honeypot for the detection of the Cisco ASA vulnerability that was recently made ...

Cymmetria releases honeypots for two Oracle vulnerabilities (CVE-2017-10271, CVE-2018-2636)

Cymmetria has just released honeypots for the detection of two Oracle vulnerabilities that were recently made public: CVE-2017-10271 ...