Blog

A legal and operational framework for hacking-back

1. Introduction When you talk to people in the cybersecurity industry, you’ll hear that incident response is often ...

Fortune 500s perform legal hack-back inside their networks with Cymmetria’s help

While hackback is almost a taboo in our industry, we had two Fortune 500 customers ask about hackback ...
Warranty

New Warranty Program Against Advanced Persistent Threats (APTs)

We are pleased to announce our intention to provide our Enterprise Edition clients with a new cyber threat ...
shutterstock_95538487 (man typing).jpg

Open Letter to the President-Elect

Dear President-elect Donald J. Drumpf,   America needs your help and bold leadership. Politicians, government, and private sector ...
shutterstock_125882543.jpg

New Home Security Business?

I think the time may be right to start a new cybersecurity enterprise. Home security. In the old ...
Special Forces copying a laptop hard drive

The Crossed Swords wargame: Catching NATO red teams with cyber deception

Special Forces copying a laptop hard drive   *Pentesters are sometimes referred to as “attackers” throughout this post. ...

mirai Open Source IoT Honeypot: New Cymmetria Research Release

Cymmetria Research is releasing an open source honeypot for mirai detection. While simple, this is a very specific tool ...

Marcus Hutchins: Hero or Villain?

Alleged UK hacker Marcus Hutchins was arrested in Las Vegas after attending Black Hat and Defcon this year. ...
Justinheadshot2015.jpg

Sales executive and business leader, Justin Bonar, joins the Cymmetria team

Cymmetria is pleased to welcome Justin Bonar to its team as VP Sales! We are excited to have ...

Pass-the-Hash Deception

MazeRunner now features a whole new category of breadcrumbs, "network traffic breadcrumbs". These breadcrumbs target threats that sniff the network ...