Blog

Research: Cyber Deception Will Be Standard For Thousands Of Organizations By 2018

Today, almost all organizations have a defense grid of firewalls, IDS/IPS, and SIEMs. This baseline grid will soon ...

Crowdsourcing The Dark Web: A One-Stop Ransomware Shop

(Published originally on Dark Reading) Ransom attacks are at an all-time high; more and more criminals are using ...

Rise of the malware-hunting malware

(Originally published on VentureBeat) Imagine this scenario: A criminal breaks into a bank and finds another criminal already hard ...

Weekend break: the 10 best hacking movies

The weekend is upon us! It’s the best time to grab a good book and get lost inside ...

Researchers have created a honeyclient capable of on-the-wire detection

Attackers switch between different types of malware, move their exploit kits between servers or constantly morph the traffic ...

The 5 best events you might have missed at the RSA and BSides(SF) conferences

Last week was great for Cymmetria: our team traveled to San Francisco for the RSA and BSides conferences, ...

Join Cymmetria at RSA 2016!

RSA 2016 has begun and Cymmetria is there in full force: our advanced cyber deception solution will be ...

Happy (and secure) Valentine's Day!

Happy Valentine's Day from the Cymmetria team! Whether or not you choose to celebrate today, keep in mind that ...

APT hunting: trust your shield – and draw your sword

How do Special Forces lay ambushes? They don't always know whence will come the enemy. They can't always ...

The VTech hack’s numbers revealed: 4.83 million users compromised

A lack of basic encryption and a flawed system design made it easy for attackers to gain access ...