Illusive in the News

September 16, 2020

How One Bank Successfully Responds to Sophisticated Threat Actors

The bank’s CISO found it invaluable to be able to deploy a solution that creates doubt and confusion in an intruder’s mind. When attackers can’t distinguish between real and deceptive assets, the security team can collect information and apply intelligence to patterns that it has observed during that time period of activity. The solution simultaneously sharpens the bank’s investigative process and constrain the attacker.

Read More >
September 15, 2020

The modern SOC: What it is, why it matters

The increased threat activity tied to the COVID-19 pandemic has exacerbated the pressures on SOCs and further accelerated the need for change, said Gil Shulman, vice president of products at Illusive Networks. He said the status quo has become untenable for many SOCs. A significant number of threats are going unaddressed and unmitigated because analysts are already overwhelmed with alert overload.

Read More >
September 9, 2020

Cutting Through the Noise of SOC Overload

Executives and leaders need to focus on transitioning the SOC to a place where it isn’t just ingesting a lot of data, but rather is actually making use of it. This is where recent improvements in accessing forensic data can play a key role in allowing analysts to work more effectively and reduce the time spent on eliminating noise. Armed with the contextual data they need to make decisions quickly, analysts more efficiently process real threats to the environment, including the entry point of an attack, the infecting vector and misconfigurations or other vulnerabilities. This information can then be incorporated to create best practices for future alert response efficiency and optimization.

Read More >
September 7, 2020

Stopping Malicious Insiders with Deception Technology

It’s harder to trick an insider, so you start by reverse-engineering the insider’s thought process. Where would he or she go to find information about new merger and acquisition activity? How could he manipulate (and cover up) account activity in clearing or settlement processes? Then, design deceptions based on the insider’s perspective.

Read More >
August 31, 2020

Reducing Risk And IT Burden With The Agentless Approach

In addition to the added IT resources needed, maintaining agents incurs greater security risks as well. Agents are vulnerable and detectable by cyberattackers.

The major vulnerability is that agents communicate to an attacker that their functionality is present on a machine. The presence of an agent tells an attacker what you are doing to stop them. If attackers gain access to a machine, they can access agents, disable them or, more disturbingly, attackers can modify agents to cover the tracks of their attack or to cause other havoc.

Read More >
August 31, 2020

What is the state of the financial sector and risk management? In other words, why do criminals attack the financial services sector…”that’s where the MONEY is!”

"There are major security concerns due to the digital transformation resulting from COVID-19. First, we've totally changed the attack surface...There is a lot more accessibility for an attacker to get into the network. Second, anomaly-detection services aren't working in a situation where there is no normal. And there is also a rise in malicious insider threats."

Listen now >
August 5, 2020

Palo Alto Networks Launches SOAR Marketplace

The Cortex XSOAR Marketplace launches with content packs available from cybersecurity companies including Code42, Google Chronicle. Illusive Networks, Infosys, Recorded Future, RiskIQ, SafeBreach and more.

Read More >
August 4, 2020

Palo Alto Networks SOAR Marketplace Open for Business

The Cortex XSOAR Marketplace launches with content packs from customers and other cybersecurity providers including Code42, Google Chronicle, Illusive Networks, Recorded Future, RiskIQ, SafeBreach, Sixgill, Tufin, and Wipro.

Read More >
July 23, 2020

Goodbye, honeypots – Hello, true deception technology

"The old-school honeypot sits by itself and collects data in isolation. Today’s deception technology moves the focus of deception beyond the honeypot to the endpoint, server and device. This gathers information across the production environment, provides previously unimagined visualization of the attack surface, and offers highly efficient detection of cyber threats at the attack beachhead."

Read More >
July 14, 2020

Using Threat Deception to Thwart Malicious Insiders

Insiders are familiar with at least parts of the network and core applications, and advanced insiders often have privileged access to high-risk systems. Because they have an insider’s understanding of company culture and business processes, they can skillfully execute their activities without attracting attention. That’s why it’s critical to detect them early in the lateral movement phase of an attack.

Adding deception to your network environment can provide you with a significant advantage. Not only can deceptions detect lateral movement of an advanced insider, but they can also help root them out.

Read More >
July 10, 2020

5 Elements of Next-Gen Deception Technology

Deception technology has moved beyond honeypots to next-generation distributed deception that surrounds the attacker with realistic, false data, destroying their ability to move laterally. This delivers immense value to organizations globally across a variety of use cases. Here are five benefits deception technology offers.

Read More >
July 1, 2020

A Few Tricks Up Their Sleeves: What Deception Technology Offers Law Firms

If law firms can’t keep their client and internal data confidential, they won’t last long. Cybercriminals know that the legal profession has traditionally under-invested in cybersecurity and are making the most of it, breaking into law firms’ networks and staying as long as possible, stealing all the data they can before being detected. Deception technology gives law firms a demonstrable means of stopping attackers before they can access confidential data.

Read More >
July 1, 2020

Saving The SOC. How To Increase Investigation Speed, Efficiency And Accuracy

The status quo for most SOCs is untenable. Analysts are burning out. There aren’t enough of them, and they are struggling to find the legitimate threats among thousands upon thousands of alerts. Humans alone cannot keep up. Many organizations are applying automation to help, but it’s not enough. A new approach is needed, one incorporating deception technology and forensics.

Read More >
June 30, 2020

Inside the modern SOC: How to align your SecOps team for success

A deepening skills shortage, data overload, and a lack of a clearly defined mission are among several factors undermining the ability of security operations center (SOC) teams to carry out their functions effectively at many organizations. Numerous recent studies suggest that, even as the role of the SOC has evolved and become more business-critical, so have the challenges facing them. Here are four tips for aligning your SOC team for success.

Read More >
June 25, 2020

Stopping cloud attackers in their tracks: A guide

It’s not enough to simply secure assets in the cloud, though, as the adoption of hybrid cloud and multi-cloud strategies continues. Organizations also need to secure pathways to and from the cloud, as well as between and within clouds. Externally-hosted services and applications don’t stand in isolation—they are connected to the corporate environment. A risk to one part of the extended ecosystem is a risk to all.

Read More >
June 16, 2020

Illusive Networks Unveils Forensics on Demand for SOC Teams

SOC teams can use Forensics on Demand to initiate forensics collection on targeted machines, Illusive stated. In addition, Forensics on Demand enables SOC teams to retrieve threat intelligence and context, so they can prioritize security alerts.

Read More >
May 28, 2020

Don’t Get Stumped by Deception: Busting 4 Myths About Distributed Deception Platforms

For all the dozens of security solutions organizations deployed to safeguard their networks, data breaches continue to occur. Unfortunately, these “solutions” haven’t proven effective at truly securing the network – allowing cybercriminals to linger undetected and undeterred, sometimes for months. Deception technology offers a different model that can give organizations the advantage over bad actors. However, there’s a lot of misinformation when it comes to this approach. Clearing that up is the first step to the successful use of this technique.

Read More >
May 20, 2020

Cyber crime and Financial Services: Blocking the Path of Least Resistance

“Triage is critical,” says Ofer Israeli, chief executive of Illusive Networks. “Security teams are overloaded by false alarms, so quickly focusing on real attacks and deprioritising others is paramount. Companies need to put greater emphasis on the post-breach stages of the attack. The goal should be identifying and paralysing attackers early – preferably where they first establish a beachhead, before they can move from system to system gathering data and doing damage as they go."

Read More >
May 8, 2020

Moving Beyond Honeypots to Next-Generation Deception Technology

Currently, honeypots gather data in isolation. Next-gen deception technology moves the focus of deception beyond the honeypot to the endpoint, server, and device. This approach gathers information across the production environment, provides previously unimagined visualization of the attack surface, and offer highly efficient detection of cyber threats at the attack beachhead.

Read More >
May 7, 2020

Market forces. An appeal to reason on 5G and COVID-19

The criminal market has followed opportunities opened up by the crisis. Not only has it become a commonplace that COVID-19 has been dangled all over the Internets as effective phishbait. It's surfaced in a new round of attacks by familiar Nigerian gangs, a business email compromise campaign Palo Alto Networks is calling "Silver Terrier," and Illusive Networks believes it's detected a nation-state-sponsored ransomware campaign with strong similarities to the techniques used by TrickBot.

Read More >
April 30, 2020

Debunking the Myths of Deception Technology

Deception is rapidly gaining attention and adoption as the market realizes the power it provides is stopping attackers who have established a beachhead within the organization’s perimeter. However, several stubborn myths surround the technology, and it’s time to debunk these so that the benefits of deception can truly be appreciated by all defenders.

Read More >
April 22, 2020

Honeypots and Deception Are Not Synonymous

The financial services industry is under assault like never before, and at a higher price tag than ever. Financial institutions are 300 times more likely than other companies to be targeted by a cyberattack, a Boston Consulting Group report found. Consequently, they spend an average of .3% of revenue and 10% of their IT budget on cybersecurity.

As FSI firms remain on the lookout for the latest technology to help them ward off attacks, deception is not often on their minds. That’s because security professionals still tend to associate deception with honeypots, which came into use in the 1990s. Honeypots were designed to lure malicious actors into interacting with a fake system, then collect and analyze attacker behavior – not to detect threats. However, deception technology has changed significantly over the years and is worth another look.

Read More >
April 15, 2020

Pandemic adds strain to already vulnerable LatAm bank security systems

Global dislocation caused by the coronavirus pandemic has led to a substantial uptick in attempted cyberattacks, increasing concerns for financial institutions in Latin America, which have been among the most susceptible to such assaults.

Major banks in Latin America already are seeing a sharp increase in phishing and other related attacks, according to the region's banking association.

"Expect more attacks," Ofer Israeli, CEO of Tel Aviv-based security company Illusive Networks, said in an emailed response to questions. Most IT departments are now "strained and distracted" with the load of employees working from home, Israeli said, which "opens up new risks and the potential attack surface expands. ... More remote employees means more potential for human error."

Read More >
April 15, 2020

From the military to the enterprise: The value of deception in the digital world

Deception has long been a fundamental part of military strategy around the world, dating as far back as ancient Egyptian times. It’s a key part of Sun Tzu’s The Art of War. Technology has made methods of deception more sophisticated, of course, but the basic premise has stood the test of time: know yourself, deceive your enemy. Armed forces the world over have used this strategy, and civilian industries have a real opportunity to learn from the successes of the military when it comes to deception technology.

Read More >
April 13, 2020

AI-powered deception technology speeds deployment, improves results

One sector of the cybersecurity industry might help compensate for these new risk factors: deception technology. Formerly known as honeypots — a term that does not Google well — deception technologies sprinkle the environment with fake "accidentally leaked" credentials, decoy databases, and mock servers that are invisible to legitimate users. You then wait for attackers to stumble on them. False positive rates are low, so companies can immediately kick off automated remediation strategies like blocking IP addresses and quarantining infected systems.

This technology may have a bad reputation for manageability and overhead, but artificial intelligence (AI) and machine learning (ML) are eliminating some of the biggest problems, and some companies are already putting it to work.

Read More >
March 31, 2020

Amid COVID-19 Crisis, Cybersecurity Executives Look to Virtual Summits for Information, Education

Data Connectors, representing the largest cybersecurity community in North America, announced it will hold its first Virtual Cybersecurity Summit.

Attendees from the community of over 600 cybersecurity professionals registered for the summit will ask questions and interact online with the CISOs, as well as each other and the organizations who will feature their solutions at the event. Solution providers for the LA Summit include Morphisec, Avanan, OneTrust, Aria Cybersecurity Solutions, Arcserve, Netskope, Illusive Networks, Spirion, Armis and many others.

Read More >
March 18, 2020

Free security resources for work-from-home employees during the COVID-19 crisis

As the world “shelters in place” amid the COVID-19 crisis, some tech companies are stepping up and offering their products and services free of charge for a limited time. The vendors below are helping the global community better cope with the COVID-19 crisis at a time of very high demand for their offerings.

Illusive Networks is offering a free remote attack risk assessment to help identify vulnerabilities in networks reconfigured to support more remote workers.

Read More >
March 3, 2020

Super Tuesday prompts election security vigilance, government warning

Potential problems extend beyond voting machines: The rise of voting apps like the one used in Iowa to tally votes essentially expand the attack surface. “The time-bound nature of voting applications makes them susceptible to sideways attacks – a particularly dangerous hacking method used by nation-state attackers,” said Illusive Networks CEO Ofer Israeli. “In a sideways attack, the hacker bypasses traditional firewall defenses, lurks in the shadows for weeks or months undetected, unleashes their attack at a specific time to inflict maximum damage, and disappears leaving no trace. Many aspects of critical infrastructure – from power distribution to voter administration systems – remain vulnerable to sideways attack.”

Read More >
March 3, 2020

Defenses Beyond Mere Deception

Deception technology has come of age in the marketplace, but there is still some customer confusion about the distinct use cases. Ofer Israeli, CEO of Illusive Networks, shares how mature companies deploy deception.

In a video interview with Information Security Media Group at RSA 2020, Israeli also discusses how deception can track lateral movement, confusion between deception use cases, the role of red teams after deception is deployed.

Read More >
January 29, 2020

How Deception Technologies Enable Proactive Cyberdefense

eception as a tactic has been around since the early days of honeypots. But today's new, much more powerful, deception technologies leverage artificial intelligence and machine learning to enable the automated deployment of fake content, lists, databases and access points that play directly into the attackers' desires and then trap them into false storage or network areas and occupy them until the threat can be contained.

Deception technologies enable the sort of proactive defense strategy that the industry can easily adopt to help to reduce data breaches.

Older generations of deception technologies called for deployment and monitoring, which required a dedicated team of forensics analysts to properly operate and deploy. Modern versions can easily auto-generate fake targets based upon scans of actual network segments, artifacts and databases.

Read More >
Biz Tech Magazine Banks and Deception Technology
June 13, 2019

How Can Banks Use Deception Technology to Their Advantage?

Financial services companies are rediscovering a very old, and very effective, defense technique — deception technology, which is far simpler to use than it used to be.

In deception technology, an enterprise sets up a fake set of data (a honeypot) on a separate network. Cybersecurity experts can detect, track and defend against an attack without real data ever being affected.

Read More >
Treasury Management International
June 1, 2019

Shoring up Treasury’s Cyber Defences: 9 Smart Steps

Did you know that paying a ransom to a cybercriminal, even if you do so in Bitcoin, could lead to a sanctions’ violation? That’s right, treasurers now have even more to think about – and get involved in – when it comes to cybercrime. Here, we examine the latest threats treasurers need to keep abreast of and ask industry experts what treasurers can do to ensure their systems and data remain protected.

Read More > illusive networks
May 6, 2019

Illusive Networks Has Developed an Ingenious Defense System to Protect Dating Sites & Apps From Hackers

Today’s dating site owners understand all too well how serious an online security issue can be, and that they have to find increasingly sophisticated methods of keeping cybercriminals from wreaking havoc with people’s private lives. A tech company called Illusive Networks is a valuable partner in this mission toward greater cybersecurity.

Read More >
silicon review illusive networks cybersecurity review
April 18, 2019

Focus on the Attacker rather than the Attack: Illusive Networks

Illusive brought together top cyber-attack specialists and pioneering cyber technology entrepreneurs with decades of collective experience in cyber warfare and cyber intelligence. It was built to tackle what has been a significant and urgent problem for cybersecurity practitioners—the challenge to stop Advanced Persistent Threats (APTs) and other advanced attacks that bypass security controls and silently gain access to organizations' most risk-sensitive and business-critical digital assets.

Read More >
business insider top 30 cybersecurity companies
April 8, 2019

VCs say these 30 cybersecurity startups will blow up in 2019

More companies than ever are paying attention to cybersecurity—and not just in Silicon Valley.

From retail to manufacturing to banks to healthcare, cybersecurity is an important issue touching every type of company today. Cyberattacks may come from petty criminals, or from sophisticated nation-state operations. Major companies are turning to creative solutions to get employees to adopt two-factor authentication or sometimes launching cybersecurity products of their own—signs that these concerns are hitting the mainstream.

Read More >
journal of cyber policy
April 8, 2019

The Pulse of Risk Detection and Response at RSA 2019

The RSA Conference offers a great chance to catch up with vendors in the major cyber security categories. This year, I spoke with a number of players in the cyber risk detection and response category. This includes Endpoint Detection and Response (EDR), but the work of risk detection and response has grown far broader and deeper in scope.

Read More >
globes israel business arena cybersecurity forum
April 8, 2019

Cybersecurity Goes on the Offensive

Israeli, US and French companies brought the latest thinking to the Cybersecurity Forum in Paris.

If one message were to emerge from the 13th annual Cybersecurity Forum here, it might come from Israel Barak, the Chief Information Security Officer (CISO) at Cybereason, a Boston-based (with origins in Israel) global leader in stopping the world’s most advanced cyber-attacks, with an extensive client list in the United States, northern Europe and Japan, now entering the French market.

Read More >
washington post Mueller report cyberattacks
March 21, 2019

The Mueller report won’t fix the problem underlying it all

When the debris settles after special counsel Robert S. Mueller III completes his investigation into Russian hacking of the 2016 presidential election, the United States will still be left with the underlying problem that triggered the probe in the first place: the threat of malicious cyberattacks against political parties, corporations and anybody else who uses the Internet.

Read More >
risk&insurance cybersecurity cyber crime
March 14, 2019

As Cyber Crime Intensifies, Focus on Critical Exposures

Cyber crime is hitting its stride, while global political tensions add complexity to an already challenging cyber security environment. While most industries are trying to weather the tides of political instability, economic constraints, trade volatility, regulatory changes and talent shortages, one industry appears to have rapidly risen above it all: the world of cyber-crime.

Read More >
TotalRetail cybersecurity illusive networks
March 13, 2019

Make Cybersecurity as Omnichannel as Your Business: 5 Questions to Ask

As retail companies advance new strategies to reach customers, they must also advance cybersecurity. Complying with the PCI Data Security Standard alone is not enough. Compliance didn't prevent major retailers from suffering breaches in 2018. Bypassing PCI-mandated controls, attackers exploited weaknesses in point-of-sale systems, created “backdoor” access through third-party partners, used stolen credentials to hack web applications, and devised ways to syphon payment card data as consumers typed it into web forms. Where there's digital innovation, attackers are on the trail.

Read More >
February 24, 2019

Closing Down Cyberattack Pathways

In today’s interconnected business environment, guarding against cybersecurity threats is increasingly complex, with enterprises susceptible to months-long business interruption and millions in real costs. But new tech offers hope…

Read More >
AIThority Illusive Networks Press
February 21, 2019

Illusive Introduces Interactive Cyber Intelligence to Better Defend Organizations Against Human Attackers

Illusive Networks, the leader in human-driven cyberattack detection and response, introduced the Illusive Attack Intelligence System, a powerful precision forensic platform that empowers security teams to respond more quickly and effectively to attacks in progress, and to improve overall cyber resilience.

Read More >
PR Newswire
February 19, 2019

Illusive Introduces Interactive Cyber Intelligence to Better Defend Organizations against Human Attackers

Illusive Networks, the leader in human-driven cyberattack detection and response, today introduced the Illusive Attack Intelligence System, a powerful precision forensic platform that empowers security teams to respond more quickly and effectively to attacks in progress, and to improve overall cyber resilience.

Read More >
December 7, 2018

The best hacks from Black Hat Europe 2018

Hacking password reset questions, thermal imaging, and rogue USB charging point attacks all featured in this week’s hacker jamboree

Learn more>>
December 6, 2018

Windows 10 security question: How do miscreants use these for post-hack persistence?

Infosec duo worked out how to remotely set their own answers

Learn more>>
December 5, 2018

Windows 10 Security Questions Prove Easy for Attackers to Exploit

New research shows how attackers can abuse security questions in Windows 10 to maintain domain privileges.

Learn more>>
December 5, 2018

Why, in 2018, is Microsoft adding security questions to Windows 10?

Attackers with admin control can abuse the feature to create a persistent backdoor.

Learn more>>
November 16, 2018

5 steps organizations can take to thwart insider security threats

Illusive Networks Founder & CEO, Ofer Israeli, discusses the top five steps organizations can take to stop malicious insiders with Information Management.

Learn more>>
November 16, 2018

The majority of business pros aren’t able to prevent cyberattacks

Nearly two-thirds of business professionals aren't confident in their abilities to prevent and address serious cyberattacks, according to a recent report from the Ponemon Institute and Illusive Networks. The report analyzed how effective organizations are in minimizing damage caused by silent attackers.

Watch now>>
November 15, 2018

Enterprises lack capability against persistent cyber attacks

A report urges organizations to strengthen their cyber defense capabilities to pre-empt, detect and respond to post-breach attacks

Learn more>>
October 7, 2018

Rethinking Healthcare Cybersecurity by Focusing on the Attacker, not the Attack

Healthcare systems, like all digital networks today are increasingly inter-connected and consumer-driven. The digital transformation necessary to make them agile, also renders them easy targets for data and identity theft, insurance fraud, and other forms of cybercrime. As the recent spate of ransomware has shown, cyberattacks on healthcare institutions also disrupt vital services and risk patient safety.

Learn More>>
August 17, 2018

Using Threat Deception on Malicious Insiders

Illusive Networks CEO Ofer Israeli reveals how distributed deception technology can be as effective against insider threats as it is against outsiders, since it thwarts the lateral movement common to both.

Read more>>
August 17, 2018

ATM Heists Only Set to Accelerate After $13M Break-In

The Cosmos Bank incident is only the latest, not the last, thanks to lagging security practices.

Read more>>
June 22, 2018

Cryptocurrencies are ripe for plunder claims cyber security expert

"according to Ofer Israeli financial cybersecurity expert and CEO of Illusive Networks. The word crypt, from the latin orLatin, refers to something hidden and secretive. The world’s cryptocurrencies are wide open, according to Israeli.

“It’s no wonder that cryptocurrency exchanges continue to get hacked. They have barely been around five minutes and most aren’t regulated. That makes them highly vulnerable to attackers,” said Israeli."

Read more>>
June 13, 2018


“Targeting financial organizations is part of their long-term strategy and compromising global financial networks via small to medium-sized banks in Central and South America whose cyber-defenses may be less sophisticated poses a higher probability of success,” [Ofer Israeli] explained.

Read more>>
June 11, 2018

Hackers target payment transfer system at Chile’s biggest bank, ‘take $10m’

Ofer Israeli, chief exec of Illusive Networks, said he believed the Lazarus Group was both behind the latest attack cyber-attack in Chile and likely to strike other banks.

Read more>>
June 11, 2018

Banco de Chile suffers massive cyber attack and loses millions

Israeli said: “Targeting financial organisations is part of their long-term strategy and compromising global financial networks via small to medium-sized banks in Central and South America whose cyber defenses may be less sophisticated poses a higher probability of success. The next Bangladesh heist is imminent unless the entire financial ecosystem does its utmost to minimise the attack surface and proactively detect attacks on the entry points.Illusive’s intelligence-driven approach to cyber defense to stop targeted attacks and Advanced Persistent Threats is deployed by 8 out of the top 30 global banks.

Read more>>
June 5, 2018

Illusive Networks | Detecting targeted attacks with innovative deception

One of the most significant concerns for organizations is the possibility of targeted attacks. Many companies employ a variety of security products, but it is often that the most sophisticated and focused attacks go undetected. Additionally, many of these products create alert fatigue for security teams, overwhelming those professionals with false positives.

Read more>>
May 31, 2018

Now that it’s here, what can we learn from the bumpy journey to GDPR compliance?

Cybersecurity expert and Founder, CEO of Illusive Networks, Ofer Israeli, says the lead time to GDPR has been crucial. “GDPR has actually forced enterprises to think about future threats, and that’s a good thing, because they must ensure that data collected now always remains secure."

Read more>>
May 26, 2018

5 ways deception tech is disrupting cybersecurity

it’s critical for organizations – both large and small – to focus their cybersecurity strategy on earlier detection and faster response. One of the technologies trend that is promising to do this, is deception.

Read more>>
May 20, 2018

Technology that will put your mind at ease

Thankfully, Illusive Networks is leading the charge on this front and beating back cybercrime as it goes. Here’s the best bit about it, though: they’re doing it in the most simplistic way possible, by which we mean they are providing hackers and cyber-thieves with all the data and information they could want – it just happens to be fake and thus utterly useless information. How’s that for an awesome plan of attack (or defence).

Read more>>
May 17, 2018

Honeypots as deception solutions: What to look for and how to buy

honeypots can be useful for a wide variety of purposes. They can help locate attackers quickly, provide a new way to automate more offensive cyber security measures, and can be useful even for smaller enterprises that don’t have their own security operations centers or a large IT staff.

Read more>>
May 14, 2018

70 Israeli Startups You Need to Follow

The country has the highest amount of startups per capita in the world, and is a leader in autonomous driving, cybersecurity, enterprise software, clean tech and digital health.

Read more>>
April 27, 2018

3 ways to minimize cyberattack threats by reducing attack surfaces

For businesses that do not have the expertise or personnel to reduce the area, exposure, and access to attack surfaces, there is help. Illusive Networks, a company started in 2014, unveiled Attack Surface Manager (ASM) at RSA 2018.

Read more>>
April 23, 2018

Deception Tech: High-Fidelity Alerts If Hackers Take Bait

Deception is probably the least complicated way to detect threats that slip past perimeter defenses, says Ofer Israeli, CEO and founder of Illusive Networks. Deception can create detection asymmetry by providing a high signal-to-noise ratio to effectively reduce analyst fatigue, he says.

Read more>>
April 23, 2018

Streamlining Detection With Deception Technology

Deception is probably the least complicated way to detect threats that slip past perimeter defenses, says Ofer Israeli, CEO and founder of Illusive Networks. Deception can create detection asymmetry by providing a high signal-to-noise ratio to effectively reduce analyst fatigue, he says.

Read more>>
April 17, 2018

Cyber Security Challenges in the Healthcare Industry: The Top Experts Speak

A holistic approach to protecting personally identifiable information (PII) should be undertaken, involving people, processes and technology, alongside enhanced security. Organizations also need to incorporate fresh, proactive measures to surface attackers with speed and precision.

Read more>>
April 11, 2018

Illusive Networks New Breakthrough in Attack Surface Reduction: ASM

Illusive ASM discovers hidden elements throughout the network that enable lateral movement and otherwise facilitate advanced attacks.

Read more>>
March 29, 2018

A big chunk of Israel’s tech scene is actually not based in Israel

When success begets success in America, some find their home country is less a market than an incubator

Read More >
March 28, 2018

Israelis were behind three of the city’s five largest funding rounds last year: WeWork, Compass and Via.

Another reason cited by nearly every Israeli entrepreneur you talk to: the time zone, which makes having half your team in Israel a lot less punishing than if you were based in San Francisco. “Seven hours’ time difference and 10 hours’ time difference might not seem like a big difference, but it is,” says Ofer Israeli, chief executive of cybersecurity company Illusive Networks.

Read More >
March 27, 2018

Laying Traps In the Cloud

“In a very broad sense, the world has understood that yes, we want to control our perimeter, but if that’s no longer feasible, we need to detect hackers and respond as efficiently as possible,” said Ofer Israeli, founder and CEO of Illusive Networks

Read More >
February 1, 2018

As Amazon Expands in Israel, Contest for Talent Heats Up

when Israeli cybersecurity firm GuardiCore launched five years ago, its founders had little difficulty hiring people, thanks to their connections in the Israeli Defense Forces. But that changed when Amazon came to town and offered salaries to some employees of 25% to 50% more than GuardiCore was paying.

Read More >
January 17, 2018

Deception: Art or Science, Ofer Israeli, Illusive Networks

Hear the interview>
January 4, 2018

Casting an eye on the 2018 cyber landscape

Read More >
December 22, 2017

Deception Networks

Read More >
December 22, 2017

SWIFT Hackers Hit Russian State Bank

This, alongside the MoneyTaker ATM thefts, is further evidence that the availability of nation-state tools has proven cyber-intrusions inevitable,” said CEO and founder of Illusive Networks Ofer Israeli, via email. “Our research has uncovered one common weakness in all these attacks—regardless of how initial intrusion is achieved, once inside the gates, advanced professional hackers must move laterally to reach their targets. By understanding this, and focusing on identifying lateral movement, defenders can stop even the most sophisticated attackers before they reach an organization’s crown jewels, and do so before intrusion becomes a damaging and costly breach.”

Read More >
December 1, 2017

Illusive Networks: Trapping Advanced Persistent Threats with Deceptions Everywhere

Illusive Networks stops APTs at the lateral movement step by deploying decoys at every endpoint throughout the infrastructure. If the hacker falls for a single decoy, the Illusive technology then kicks into forensic mode, collecting information about it in order to identify and stop the attack.

Read More >
November 15, 2017

Deception Technology: Prevention Reimagined

How state-of-the-art tools make it practical and cost-effective to identify and engage attackers in early lateral movement stages to prevent them from reaching critical systems and data.

Read more >
October 30, 2017

Mil-spec infosec spinout Cryptonite reveals its network-scrambling tech

Deception-based technology from the likes of Illusive Networks and others as well as network-based intrusion prevention technology aims to combat similar threats.

Read More >
October 24, 2017

New Tool Debuts for Hacking Back at Hackers in Your Network

But a wave of deception technology startups such as Cymmetria, Illusive Networks, and TrapX, as well as veteran security firms, offer commercial products that allow organizations to be a bit more aggressive in their defenses with phony devices or fake data to lure and catch attackers in action.

Read More >
October 23, 2017

Wowee. Look at this server. Definitely keep critical data in there. Yup

Illusive Networks places extra network destinations and shares inside a server's deep data stores. An attacker lands on a decoy and looks where to go next, finding a mix of real and phoney destinations, which all look genuine.

Read more >
October 20, 2017

Illusive Networks’ New Mainframe Deception Addresses Missing Link to Secure Financial Services Against Sophisticated Cyber Attacks

As soon as attackers attempt to use the deceptive data, Illusive detects and alerts enterprise security teams, providing real-time, contextual forensic data from the source host that enable informed, targeted and timely incident response operations.

Read more >
October 17, 2017

Citi fosters Israeli fintech to meet changing needs of financial sector

Citi’s global venture arm has also invested in three Israeli startups: cybersecurity firm Illusive Networks, Dyadic Security and BlueVine, an online lender.

Read more >
October 17, 2017

Mainframe Security: Sometimes Overlooked, But Not by Hackers

Automatically generated and AI-driven, Illusive Networks' deceptions are tailor-made for the customer’s environment to appear realistic and authentic to attackers.

Read more >
October 11, 2017

Microsoft launches $5.5m AI funding competition

Behind loginMicrosoft Ventures was launched last year for the purpose of investing in start-ups, with its portfolio currently including Illusive Networks and Aqua Security.

Read more >
September 21, 2017

Automation is crucial for reducing costs and operational overhead – interview with Matan Kubovsky, VP of R&D at Illusive Networks

We provide real-time visualization of where the attacker is in relation to these risk sensitive assets... Illusive helps SOCs prioritize high-risk incidents, and eventually deal with the most urgent tasks.

Read more >
September 6, 2017

Nasdaq 100: Technology In The Driver’s Seat

Starting from the proposition that some hackers will find their way through traditional firewalls and other security obstacles, Illusive uses virtual and augmented reality technology to create a decoy version of a company’s network to trap hackers.

Read more >
August 4, 2017

Deception networks: Reducing alert fatigue and increasing security through an alternate reality

Deception networks take the honeypot concept to the extreme, creating fake administrator accounts, applications, and data that reside next to genuine components on the same machine.

Read More >
July 30, 2017

Illusive Networks says that deception everywhere is the way to go

Illusive networks pushes out deception data (user credentials, net connections, shares etc) to all systems on the network. This is done by an executable that runs periodically and then cleans up after itself. This means that every production system in the environment becomes part of the deception. This effectively corrupts the data that an attacker needs to continue to operate in an environment.

Read More >
July 28, 2017

33 Hot New Security Products Announced At Black Hat 2017

Israeli-security startup illusive networks announced an expansion of its deception technology solution at Black Hat with the launch of the External Incident Application Program Interface (API) and Risk Metrics tool.

Read More >
July 27, 2017

Top 100 Cybersecurity Startups in Q2 of 2017

The top 100 companies on the The Cybersecurity 500 list

Read More >
July 23, 2017

Malwarebytes, Minerva Labs, and EdgeWave – Enterprise Security Weekly #54

illusive networks launches its External Incident Application Program Interface

Read More >
July 18, 2017

5 questions with Team8

illusive networks looks at the biggest threat facing the cyber industry today - targeted attacks - and tries to solve it from the perspective of the attackers.

Read More >
July 17, 2017

The art of deception networks: New technique snares cyberattackers

“If we can accept that even with the best of threat prevention and detection, we will be breached, then adding deceptions can flip the paradigm,”

Read More >