L A B Y R I N T H

Loading

Gartner Peer Insights Labyrinth the First Finalists for the ECSO CISO Choice Award 2025
Cyber Deception: Transforming Defensive Strategies

Imagine you’re the CISO of a large enterprise, constantly battling the evolving landscape of cyber threats. One day, you receive an alert: an attacker has breached your network. But instead o...

Why deception is more than honeypots?

Deception is a straightforward yet clever technique. Initially, it involved simple traps to lure attackers and uncover their tactics. These early methods aimed to distract and study cybercriminals ...

Deception technology: a modern method of defending against attacks

Author: Oleg Poligenko, Chief Information Security Officer (CISO) at Nova Digital (Nova Group) In the modern world of cyber threats, traditional methods of data protection are becoming less effe...

Labyrinth Security Solutions received a grant from the USAID Cybersecurity Activity to develop a new module to enhance the platform’s detection capabilities.

The Labyrinth team is honored to announce cooperation with the USAID Cybersecurity for Critical Infrastructure in Ukraine Activity, which aims to develop a new module to extend the Deception Platfo...

Demystifying attack vectors on the Labyrinth Deception Platform

Every solution, regardless of its sophistication or purpose, inherently carries risks, including the potential for vulnerabilities. These risks can undermine user trust and compromise both personal...

Dear support, how should we choose which decoys to deploy?

One of the most frequently asked questions we get at support, when working with clients and partners, is how to choose which kinds of Points (network decoys in Labyrinth Deception Platform) to util...

Hello World… deception world

While deception in our everyday lives is often associated with trickery, lies, and subterfuge, it has found its role in modern cybersecurity practices and approaches. In its core, cyber decept...

Top Ten Cybersecurity Misconfigurations

Via NSA and CISA Red and Blue team assessments and through the activities of NSA and CISA Hunt and Incident Response teams, the agencies specified the following ten most typical network misconfig...

Key insights from Threat Research Report “Russia's Cyber Tactics: Lessons Learnt in H1’2023”

We selected the most valuable ideas from Threat Research Report “Russia's Cyber Tactics: Lessons Learnt in H1’2023” and wanted to share them with those interested in modern ...

Use of MITRE ATT&CK® in LABYRINTH alerts

What is MITRE ATT&CK®? MITRE ATT&CK® is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base i...

OWASP® CRS for Web Protection

What is OWASP® CRS? The Open Worldwide Application Security Project® (OWASP) is a nonprofit foundation that works to improve software security. One of many OWASP’s projects is Core...

Strengthen your SOC using Deception Technology

Today we want to share some thoughts regarding the Security operations center (SOC)’s role in your cybersecurity strategy.  While examining Gartner’s “Tips for Selectin...

Spyboy’s Endpoint Protection Terminator: Unfolding Future Risks for Cybersecurity Community

Recently, the IS community was rocked by news about a new tool that could easily bypass Endpoint Protection systems and disable more than twenty cybersecurity solutions, including such giants as Mc...

Labyrinth Deception Platform: Beyond ESXiArgs Attacks

ESXiArgs ransomware attacks are known for targeting VMware ESXi servers worldwide, which is currently one of the most crucial cybersecurity issues. As a vast number of companies around the world w...

Deceptive security and Splunk: the power of Labyrinth & Splunk two-way integration

Quite often, aiming to speed up the process of deploying their IS system, companies may be tempted to start deploying a SIEM as its foundation without a pre-developed tactic and strategy for its us...

Case Study: Pharma Сompany

Please read our latest case study to discover how our customer, a pharmaceutical company, was able to protect their IT assets and catch adversaries with the Labyrinth Deception Platform. Summary...

Log4j vulnerability

Log4j (also known as Log4Shell) vulnerability is one of the most viral cybersecurity issues of 2021, which is still a great pain point for the world IT community. Log4j was initially released mo...

From “nice to have” to “must have”: the role of Cyber Deception in active defense

The importance of active defense and key role of cyber deception in active defense were emphasized by Mitre Corporation in its MITRE Shield - a publicly available knowledge base on the methods and ...

Web protection

The Summary of Findings in the recently published 2021 Data Breach Investigation Report shows that Web Applications Attack is the second most commonly used approach leading to both, breaches, and i...

Two way integration with IBM Qradar

To enrich security alerts generated by Labyrinth Deception Platform, our team has developed a deep integration with one of the most popular and functional SIEM systems – IBM QRadar. This two-...

Practical cases

Always good to know that your solution is efficient and deliver significant value to customers! In this blogpost we described several real-world use cases of Labyrinth Deception Platform, from one ...

How to protect your Exchange from PROXY LOGON

One of the biggest recent news in the IT field was the disclosure of information about four critical vulnerabilities in the Microsoft Exchange mail server at once. Moreover, these vulnerabilities h...

Case study PC Ukraine

Read our latest case study to get to know how our customer, Polygraph Combine "Ukraina”, was able to ensure the protection of their IT network, with a security perimeter eroded by remote...

Full OS vs OS/Service emulation

Comparison of two approaches to simulations implementation in Deception solutions: Full OS vs OS/Service emulation   Many IS professionals unequivocally state that Deception systems ar...

Subscribe to our Newsletter

You successfully subscribed!