Cyber Deception

Linux SSH interaction

Unexpected challenges: Allow SSH service on Linux decoys to accept any user and password

When customers started using Cymmetria’s MazeRunner on an Internet-facing interface, we were a bit surprised. Perhaps we shouldn’t have been; after all, honeypots have been used that way since their inception. But modern cyber deception is about controlling the attacker’s path once they are already inside your network, and detecting them—fast. Thus, some of our …

Unexpected challenges: Allow SSH service on Linux decoys to accept any user and passwordRead More »

shutterstock_445236850

Using cyber deception to gain visibility and control of IoT devices

Cyber deception is very effective in IoT security, although naturally there is a limit to that effectiveness. Security concerns with IoT revolve around a few central issues (threats), which include visibility into the existence of IoT devices, vulnerability of IoT devices, what these IoT devices might be able to do, and how they can be …

Using cyber deception to gain visibility and control of IoT devicesRead More »

Special Forces copying a laptop hard drive

The Crossed Swords wargame: Catching NATO red teams with cyber deception

Special Forces copying a laptop hard drive   *Pentesters are sometimes referred to as “attackers” throughout this post. Once a year, the pentesters and red teams of the countries of NATO descend on Tallinn to visit the NATO Cooperative Cyber Defence Centre of Excellence (CCD COE) for the Crossed Swords wargame (not to be confused …

The Crossed Swords wargame: Catching NATO red teams with cyber deceptionRead More »

French elections hack: Successful counterintelligence using cyber deception

In case you’re not up to speed: In the recent French elections, just before the election communication blackout was announced, stolen documents and emails (supposedly belonging to French President-elect, Emmanuel Macron) were released. Macron’s PR team immediately released a statement saying that some of these emails were fake. When the press reported on the incident, …

French elections hack: Successful counterintelligence using cyber deceptionRead More »

MR comparison table - without download row.png

Lots of new deception capabilities in our new Community Edition

Boom! A brand new version of the MazeRunner Community Edition. Our widely-used cyber deception platform now has an API, scaling automation features, Responder.py (Pass-the-Hash) breadcrumbs, Active Directory integration, and much more. Other than their intended uses, there are very few differences between MazeRunner’s Community and Enterprise Editions. The Community Edition does not support Windows due …

Lots of new deception capabilities in our new Community EditionRead More »

What do industry leaders have to say about cyber deception?

If you’ve been following this blog you’ll have noticed that we’re not shy and we love to talk about our industry and breaking trends. At the same time, we’re always on the lookout for industry confirmation for words of the wise to further boost our determination and quest for cybersecured organizations. We strongly believe in …

What do industry leaders have to say about cyber deception?Read More »

Cyber Deception Startup Cymmetria Named “Cool Vendor” By Gartner

Cymmetria, a developer of next-generation, comprehensive cyber deception solutions, today announced it has been named a 2016 Cool Vendor within the Security Infrastructure Protection category. Gartner’s Cool Vendors in security infrastructure protection offer approaches that are distinct for their creativity and suitability to specific needs. “We’re honored to be recognized as a Cool Vendor by …

Cyber Deception Startup Cymmetria Named “Cool Vendor” By GartnerRead More »

Research: Cyber Deception Will Be Standard For Thousands Of Organizations By 2018

Today, almost all organizations have a defense grid of firewalls, IDS/IPS, and SIEMs. This baseline grid will soon include advanced cyber deception elements as well. A Gartner research study predicts that by 2018, 10% of enterprises will use cyber deception tools and tactics – and actively participate in deception operations against attackers. As we see it, there are …

Research: Cyber Deception Will Be Standard For Thousands Of Organizations By 2018Read More »

Scroll to Top