Deception in real-world situations
A few days ago it was reported that Israel’s Defense Forces has used deception against Hezbollah, making the latter believe its strike against the IDF was successful and caused several
A few days ago it was reported that Israel’s Defense Forces has used deception against Hezbollah, making the latter believe its strike against the IDF was successful and caused several
So, what can be learned from the Chernobyl disaster and how it can be implemented in Cyber security operations? Lately, everyone is talking about the new HBO miniseries, Chernobyl, portraying
#1 – Agentless is not really agentless While it’s true that with agentless products you don’t install the vendor’s components on the endpoint itself, the vendor’s server still utilizes existing
Deceptive Bytes, a leading endpoint deception company that enables enterprises the ability to prevent cyber attacks in real time, announces it was recognized as a Gartner “Cool Vendor” in its
OK, maybe not all of them, but here’s the story.. Last month Microsoft released its usual OS updates to Windows on what is known to be Patch Tuesday. Not long
Artificial Intelligence (AI) and Machine Learning (ML) are considered the next evolution in computer science as they allow computers to perform complex decisions and tasks that were up until now
The new year is around the corner and as we prepare for it, we wanted to take a look at what we should expect, here are some of our predictions
There are several reasons why cyber security experts urge people to change their thinking when it comes to security… We are informed Like many in their respective fields, we keep
In our last two posts we’ve shown how vendors like Symantec and Microsoft (among others) miss detecting threats due to the nature of how their engines operate. So how do
Symantec’s Endpoint Protection is not the only Anti-malware engine that has issues related to detection, as we stated before. We have found issues with Microsoft’s Windows Defender engine, which is