Technology

dashboard

A new year, a new version of the MazeRunner Community Edition!

2017 has been an exciting year for Cymmetria. We’ve seen deception gain popularity, and our products are now used by some of the world’s largest organizations, as well as many of the coolest smaller ones. While we’re focusing a lot of our efforts on deployment automation and overall scalability for enterprises, we are committed to …

A new year, a new version of the MazeRunner Community Edition!Read More »

shutterstock_445236850

Using cyber deception to gain visibility and control of IoT devices

Cyber deception is very effective in IoT security, although naturally there is a limit to that effectiveness. Security concerns with IoT revolve around a few central issues (threats), which include visibility into the existence of IoT devices, vulnerability of IoT devices, what these IoT devices might be able to do, and how they can be …

Using cyber deception to gain visibility and control of IoT devicesRead More »

dashboard

Beyond PewPew: Building security visualization that matters

With version 1.6 of Cymmetria’s MazeRunner, we released a new cyber deception visualization module. It’s not just awesome, it’s actually useful.   MazeRunner Dashboard Visualization has proven its value many times over in many fields, and in security specifically. But while visualization is useful, how do we move past Threatbutt-like, cool-yet-meaningless maps, to a useful …

Beyond PewPew: Building security visualization that mattersRead More »

You can run command ‘history -c’, but you can’t hide: MazeRunner Community Edition is one step ahead

This past week, a MazeRunner Community Edition user, named Antonio, reached out to Cymmetria and asked us to help him deploy MazeRunner in his network. One of our developers worked with Antonio to help him get everything set up to his liking; this included helping him build his first deception campaign, which included two Internet-facing SSH decoys. Within …

You can run command ‘history -c’, but you can’t hide: MazeRunner Community Edition is one step aheadRead More »

Crowdsourcing The Dark Web: A One-Stop Ransomware Shop

(Published originally on Dark Reading) Ransom attacks are at an all-time high; more and more criminals are using common tools to steal data and extort data owners. But this type of attack can be risky for the cybercriminal because, unlike stealthy advanced attacks, such operations require interaction with the victim. Furthermore, even if the victim …

Crowdsourcing The Dark Web: A One-Stop Ransomware ShopRead More »

Scroll to Top