L A B Y R I N T H

Loading

Gartner Peer Insights
Top Ten Cybersecurity Misconfigurations

Via NSA and CISA Red and Blue team assessments and through the activities of NSA and CISA Hunt and Incident Response teams, the agencies specified the following ten most typical network misconfig...

Labyrinth Forges Strategic Alliance with UnderDefense for Cybersecurity Excellence

Labyrinth and UnderDefense are excited to announce their innovative partnership that combines Labyrinth’s exceptional team of cybersecurity experts with UnderDefense’s Security-as-a-s...

Labyrinth Announces EMEA Channel Chief

Zabrze, 17th October 2023 - LABYRINTH SECURITY SOLUTIONS, an expert cybersecurity company specializing in top-notch deception technology, is thrilled to announce a significant addition to its exe...

Key insights from Threat Research Report “Russia's Cyber Tactics: Lessons Learnt in H1’2023”

We selected the most valuable ideas from Threat Research Report “Russia's Cyber Tactics: Lessons Learnt in H1’2023” and wanted to share them with those interested in modern ...

Stinet becomes an Authorized Partner of Labyrinth

Labyrinth is pleased to announce a partnership with Stinet, an integrator focusing on IT security policy and reliability issues. Stinet has been specializing in providing ICT security technologi...

Release notes v2.0.53

1. NEW AND IMPROVED  1.1. API for interaction with Labyrinth Deception Platform  We added a REST API to obtain the necessary data when working with Labyrinth Deception Platform. Cur...

Use of MITRE ATT&CK® in LABYRINTH alerts

What is MITRE ATT&CK®? MITRE ATT&CK® is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base i...

OWASP® CRS for Web Protection

What is OWASP® CRS? The Open Worldwide Application Security Project® (OWASP) is a nonprofit foundation that works to improve software security. One of many OWASP’s projects is Core...

Strengthen your SOC using Deception Technology

Today we want to share some thoughts regarding the Security operations center (SOC)’s role in your cybersecurity strategy.  While examining Gartner’s “Tips for Selectin...

Cybersecurity in Wartime: Challenges for the State and Business

  Our colleague, Yuriy Gatupov, Labyrinth's CCO, participated in the panel discussion "Key lessons for companies' security" at Lviv IT Cluster's conference, which was ...

Labyrinth partners with Incident Busters Forum 2023

On June 21-22, 2023, Labyrinth had the pleasure of participating in the first edition of the Incident Busters Forum event in Warsaw, where there were lectures, discussions, a decision-making game...

beyond SSL and Labyrinth: more security for your company

beyond SSL GmbH and Labyrinth Security Solutions have created an alliance of their “SparkView” and “Deception Platform” technologies to provide even more securit...

Spyboy’s Endpoint Protection Terminator: Unfolding Future Risks for Cybersecurity Community

Recently, the IS community was rocked by news about a new tool that could easily bypass Endpoint Protection systems and disable more than twenty cybersecurity solutions, including such giants as Mc...

Release notes v2.0.52

1. NEW AND IMPROVED 1.1. Customization of Points settings This release has become an impetus for further development in expanding the number of parameters for customizing the Points that will be ...

Labyrinth and ALESTA Partnership Announcement

Labyrint's team is happy to announce our new partnership agreement with ALESTA,  a well-known Ukrainian system integration company. ALESTA is a modern system integrator aiming its efforts...

Business Balance cooperates with Labyrinth Security Solutions

We are pleased to communicate the establishment of business cooperation between Business Balance and Labyrinth Security Solutions, which will enable the implementation of deception technology to SM...

Labyrinth Joined Partnership for Cyber Security Innovation (PCSI)

The Labyrinth Development team is honored to announce joining The Partnership for Cyber Security Innovation (PCSI) as a Laison Partner. PCSI is a public-private alliance performing a fundamental f...

Release notes v2.0.51

1. NEW AND IMPROVED 1.1. Integrations: Crowdstrike The integration allows you to: Enrich the alert with data about the host from which the attack was launched based on the alert's Source IP;...

Labyrinth is a new ECSO member

We are glad to announce that Labyrinth is a new European Cyber Security Organisation (ECSO) member. ECSO's main objective is to support all initiatives to develop, promote and encourage Europe...

Labyrinth Deception Platform: Beyond ESXiArgs Attacks

ESXiArgs ransomware attacks are known for targeting VMware ESXi servers worldwide, which is currently one of the most crucial cybersecurity issues. As a vast number of companies around the world w...

Deceptive security and Splunk: the power of Labyrinth & Splunk two-way integration

Quite often, aiming to speed up the process of deploying their IS system, companies may be tempted to start deploying a SIEM as its foundation without a pre-developed tactic and strategy for its us...

Becontinous becomes a partner of Labyrinth Security Solutions

Becontinous provides solutions in the area of information security and cybersecurity. The company is a team of experts with many years of experience in supporting customers in the implementation of...

Release notes v2.0.50

1. NEW AND IMPROVED 1.1. Improved Honeynet list Honeynet list was refactored, which includes: New pagination Filtration Data download in CSV format 1.2. Description of a re...

Labyrinth and Emplos Partnership Announcement

We are proud to announce our first partnership in the Baltic countries with Emplos LTD. Emplos LTD is an IT systems integrator with an impeccable reputation, which offers its customers innovat...

Case Study: Pharma Сompany

Please read our latest case study to discover how our customer, a pharmaceutical company, was able to protect their IT assets and catch adversaries with the Labyrinth Deception Platform. Summary...

Global Data Security becomes a distributor of Labyrinth Deception Platform

We welcome our first distributor in the European Union, who will support partners in Romania and Moldova. GLOBAL DATA SECURITY is well known distributor for cybersecurity solutions, focused on...

Log4j vulnerability

Log4j (also known as Log4Shell) vulnerability is one of the most viral cybersecurity issues of 2021, which is still a great pain point for the world IT community. Log4j was initially released mo...

From “nice to have” to “must have”: the role of Cyber Deception in active defense

The importance of active defense and key role of cyber deception in active defense were emphasized by Mitre Corporation in its MITRE Shield - a publicly available knowledge base on the methods and ...

We are welcome TIVA

Our partner network is growing - we are welcome TIVA, the company that specialized in design, construction, and integration of security systems. The main mission of the company is to create specia...

Web protection

The Summary of Findings in the recently published 2021 Data Breach Investigation Report shows that Web Applications Attack is the second most commonly used approach leading to both, breaches, and i...

Two way integration with IBM Qradar

To enrich security alerts generated by Labyrinth Deception Platform, our team has developed a deep integration with one of the most popular and functional SIEM systems – IBM QRadar. This two-...

Practical cases

Always good to know that your solution is efficient and deliver significant value to customers! In this blogpost we described several real-world use cases of Labyrinth Deception Platform, from one ...

Release Notes 1.3.5

Feature list New timeline on the dashboard With the help of the new dashlet, an operator can quickly get visual information about the level of malicious activities in a given period of ti...

How to protect your Exchange from PROXY LOGON

One of the biggest recent news in the IT field was the disclosure of information about four critical vulnerabilities in the Microsoft Exchange mail server at once. Moreover, these vulnerabilities h...

Release Notes 1.3.4

Feature list The new dashboard This release introduces a significant redesign of the dashboard. Now the system operator can choose a time period and the information for the desired period wi...

Case study PC Ukraine

Read our latest case study to get to know how our customer, Polygraph Combine "Ukraina”, was able to ensure the protection of their IT network, with a security perimeter eroded by remote...

Amind Partnership Announcement

We are glad to announce that our partner network was enhanced by new system integrator – Amind! This strong technical collaboration will help our customers to get even more benefits out of La...

Release Notes 1.2.3

Features list The manual mode of point types distribution in Honeynet Prior to this release, the choice of point types and the number of points to generate was carried out fully automatically...

Full OS vs OS/Service emulation

Comparison of two approaches to simulations implementation in Deception solutions: Full OS vs OS/Service emulation   Many IS professionals unequivocally state that Deception systems ar...

Labyrinth and Netwave Partnership Announcement

We are proud to announce our new partnership with Netwave for the promotion of Labyrinth Deception Platform that allows organizations to implement network detection and response (NDR) solution to d...

Release Notes 1.2.0

We are excited to announce that the newest version of Labyrinth Deception Platform is here! This release is full of new features that provide our users with more attack visibility, more convenient ...

New Partnership Announcement

We are welcome our new partner - CS Consulting! The company has over 10 years of experience in consultancy and implementing innovative solutions in the field of information security, data backup, a...

Cybersecurity - Protecting Business, Protecting the State

Our team took part in the third international forum "Cybersecurity - Protecting Business, Protecting the State". After long months of COVID break, it was a great pleasure to meet so many ...

Octava Cyber Defence

We are excited to announce the start of our partnership with one of the leading Ukrainian MSSP providers – Octava Cyber Defence! We believe that this  help to enhance Octava’s secu...

SWG Graduation certificate

We are proud to announce that our team has successfully finished the Startup Wise Guys 7 week Online Pre-acceleration program. What a journey this has been! Thank you, Startup Wise Guys team, for t...