Join us to explore various research around deception and security.
Analysis of a recent NPM supply chain attack that deployed Scavenger malware through compromised packages, including a new overlooked phishing technique.
How recognizing attackers as goal-driven individuals transforms defensive philosophy. Learn why simple, psychologically-grounded deceptions outperform technical complexity.
How threat intelligence transforms cyber deception from guesswork into strategic planning - understanding what attackers actually do and why it matters.
A comprehensive framework for assessing and advancing your deception capabilities. Includes detailed KPIs, practical metrics, implementation guidance, and a self-assessment quiz to determine your current maturity level.
A deep dive into the fundamentals of deception, from military doctrine to cybersecurity excellence.
After years of building deception technology and watching SOC teams struggle with yet another dashboard, we've made a fundamental shift in how we deliver cyber deception.
An insider's perspective on why current security products fail to stop modern red teams and sophisticated attackers, and what security teams need to know.
Explore the dual nature of AWS honey tokens, powerful tools for detecting attackers but with hidden risks. This deep dive covers their benefits, technical flaws, and real-world implications.