Blog

Rise of the malware-hunting malware

(Originally published on VentureBeat) Imagine this scenario: A criminal breaks into a bank and finds another criminal already hard ...

Weekend break: the 10 best hacking movies

The weekend is upon us! It’s the best time to grab a good book and get lost inside ...

Researchers have created a honeyclient capable of on-the-wire detection

Attackers switch between different types of malware, move their exploit kits between servers or constantly morph the traffic ...

The 5 best events you might have missed at the RSA and BSides(SF) conferences

Last week was great for Cymmetria: our team traveled to San Francisco for the RSA and BSides conferences, ...

Join Cymmetria at RSA 2016!

RSA 2016 has begun and Cymmetria is there in full force: our advanced cyber deception solution will be ...

Happy (and secure) Valentine's Day!

Happy Valentine's Day from the Cymmetria team! Whether or not you choose to celebrate today, keep in mind that ...

APT hunting: trust your shield – and draw your sword

How do Special Forces lay ambushes? They don't always know whence will come the enemy. They can't always ...

The VTech hack’s numbers revealed: 4.83 million users compromised

A lack of basic encryption and a flawed system design made it easy for attackers to gain access ...

32C3: The Cymmetria team chooses the best lectures

Last week the Cymmetria team traveled to the lovely city of Hamburg, Germany for 32C3 and enjoyed great ...

The Most Valuable Thing in the World, in terms of STAR WARS™

Recently, like many of you, I saw the new Star Wars film. I was very impressed. I just ...