L A B Y R I N T H

Loading

Gartner Peer Insights
Dear support, how should we choose which decoys to deploy?

One of the most frequently asked questions we get at support, when working with clients and partners, is how to choose which kinds of Points (network decoys in Labyrinth Deception Platform) to util...

Hello World… deception world

While deception in our everyday lives is often associated with trickery, lies, and subterfuge, it has found its role in modern cybersecurity practices and approaches. In its core, cyber decept...

Top Ten Cybersecurity Misconfigurations

Via NSA and CISA Red and Blue team assessments and through the activities of NSA and CISA Hunt and Incident Response teams, the agencies specified the following ten most typical network misconfig...

Key insights from Threat Research Report “Russia's Cyber Tactics: Lessons Learnt in H1’2023”

We selected the most valuable ideas from Threat Research Report “Russia's Cyber Tactics: Lessons Learnt in H1’2023” and wanted to share them with those interested in modern ...

Use of MITRE ATT&CK® in LABYRINTH alerts

What is MITRE ATT&CK®? MITRE ATT&CK® is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base i...

OWASP® CRS for Web Protection

What is OWASP® CRS? The Open Worldwide Application Security Project® (OWASP) is a nonprofit foundation that works to improve software security. One of many OWASP’s projects is Core...

Strengthen your SOC using Deception Technology

Today we want to share some thoughts regarding the Security operations center (SOC)’s role in your cybersecurity strategy.  While examining Gartner’s “Tips for Selectin...

Spyboy’s Endpoint Protection Terminator: Unfolding Future Risks for Cybersecurity Community

Recently, the IS community was rocked by news about a new tool that could easily bypass Endpoint Protection systems and disable more than twenty cybersecurity solutions, including such giants as Mc...

Labyrinth Deception Platform: Beyond ESXiArgs Attacks

ESXiArgs ransomware attacks are known for targeting VMware ESXi servers worldwide, which is currently one of the most crucial cybersecurity issues. As a vast number of companies around the world w...

Deceptive security and Splunk: the power of Labyrinth & Splunk two-way integration

Quite often, aiming to speed up the process of deploying their IS system, companies may be tempted to start deploying a SIEM as its foundation without a pre-developed tactic and strategy for its us...

Case Study: Pharma Сompany

Please read our latest case study to discover how our customer, a pharmaceutical company, was able to protect their IT assets and catch adversaries with the Labyrinth Deception Platform. Summary...

Log4j vulnerability

Log4j (also known as Log4Shell) vulnerability is one of the most viral cybersecurity issues of 2021, which is still a great pain point for the world IT community. Log4j was initially released mo...

From “nice to have” to “must have”: the role of Cyber Deception in active defense

The importance of active defense and key role of cyber deception in active defense were emphasized by Mitre Corporation in its MITRE Shield - a publicly available knowledge base on the methods and ...

Web protection

The Summary of Findings in the recently published 2021 Data Breach Investigation Report shows that Web Applications Attack is the second most commonly used approach leading to both, breaches, and i...

Two way integration with IBM Qradar

To enrich security alerts generated by Labyrinth Deception Platform, our team has developed a deep integration with one of the most popular and functional SIEM systems – IBM QRadar. This two-...

Practical cases

Always good to know that your solution is efficient and deliver significant value to customers! In this blogpost we described several real-world use cases of Labyrinth Deception Platform, from one ...

How to protect your Exchange from PROXY LOGON

One of the biggest recent news in the IT field was the disclosure of information about four critical vulnerabilities in the Microsoft Exchange mail server at once. Moreover, these vulnerabilities h...

Case study PC Ukraine

Read our latest case study to get to know how our customer, Polygraph Combine "Ukraina”, was able to ensure the protection of their IT network, with a security perimeter eroded by remote...

Full OS vs OS/Service emulation

Comparison of two approaches to simulations implementation in Deception solutions: Full OS vs OS/Service emulation   Many IS professionals unequivocally state that Deception systems ar...

Subscribe to our Newsletter

You successfully subscribed!