Illusive in the News

June 22, 2018

Cryptocurrencies are ripe for plunder claims cyber security expert

"according to Ofer Israeli financial cybersecurity expert and CEO of Illusive Networks. The word crypt, from the latin orLatin, refers to something hidden and secretive. The world’s cryptocurrencies are wide open, according to Israeli.

“It’s no wonder that cryptocurrency exchanges continue to get hacked. They have barely been around five minutes and most aren’t regulated. That makes them highly vulnerable to attackers,” said Israeli."

Read more>>
June 13, 2018

BANCO DE CHILE WIPER ATTACK JUST A COVER FOR $10M SWIFT HEIST

“Targeting financial organizations is part of their long-term strategy and compromising global financial networks via small to medium-sized banks in Central and South America whose cyber-defenses may be less sophisticated poses a higher probability of success,” [Ofer Israeli] explained.

Read more>>
June 11, 2018

Hackers target payment transfer system at Chile’s biggest bank, ‘take $10m’

Ofer Israeli, chief exec of Illusive Networks, said he believed the Lazarus Group was both behind the latest attack cyber-attack in Chile and likely to strike other banks.

Read more>>
June 11, 2018

Banco de Chile suffers massive cyber attack and loses millions

Israeli said: “Targeting financial organisations is part of their long-term strategy and compromising global financial networks via small to medium-sized banks in Central and South America whose cyber defenses may be less sophisticated poses a higher probability of success. The next Bangladesh heist is imminent unless the entire financial ecosystem does its utmost to minimise the attack surface and proactively detect attacks on the entry points.Illusive’s intelligence-driven approach to cyber defense to stop targeted attacks and Advanced Persistent Threats is deployed by 8 out of the top 30 global banks.

Read more>>
June 5, 2018

Illusive Networks | Detecting targeted attacks with innovative deception

One of the most significant concerns for organizations is the possibility of targeted attacks. Many companies employ a variety of security products, but it is often that the most sophisticated and focused attacks go undetected. Additionally, many of these products create alert fatigue for security teams, overwhelming those professionals with false positives.

Read more>>
May 31, 2018

Now that it’s here, what can we learn from the bumpy journey to GDPR compliance?

Cybersecurity expert and Founder, CEO of Illusive Networks, Ofer Israeli, says the lead time to GDPR has been crucial. “GDPR has actually forced enterprises to think about future threats, and that’s a good thing, because they must ensure that data collected now always remains secure."

Read more>>
May 26, 2018

5 ways deception tech is disrupting cybersecurity

it’s critical for organizations – both large and small – to focus their cybersecurity strategy on earlier detection and faster response. One of the technologies trend that is promising to do this, is deception.

Read more>>
May 20, 2018

Technology that will put your mind at ease

Thankfully, Illusive Networks is leading the charge on this front and beating back cybercrime as it goes. Here’s the best bit about it, though: they’re doing it in the most simplistic way possible, by which we mean they are providing hackers and cyber-thieves with all the data and information they could want – it just happens to be fake and thus utterly useless information. How’s that for an awesome plan of attack (or defence).

Read more>>
May 17, 2018

Honeypots as deception solutions: What to look for and how to buy

honeypots can be useful for a wide variety of purposes. They can help locate attackers quickly, provide a new way to automate more offensive cyber security measures, and can be useful even for smaller enterprises that don’t have their own security operations centers or a large IT staff.

Read more>>
May 14, 2018

70 Israeli Startups You Need to Follow

The country has the highest amount of startups per capita in the world, and is a leader in autonomous driving, cybersecurity, enterprise software, clean tech and digital health.

Read more>>
April 27, 2018

3 ways to minimize cyberattack threats by reducing attack surfaces

For businesses that do not have the expertise or personnel to reduce the area, exposure, and access to attack surfaces, there is help. Illusive Networks, a company started in 2014, unveiled Attack Surface Manager (ASM) at RSA 2018.

Read more>>
April 23, 2018

Deception Tech: High-Fidelity Alerts If Hackers Take Bait

Deception is probably the least complicated way to detect threats that slip past perimeter defenses, says Ofer Israeli, CEO and founder of Illusive Networks. Deception can create detection asymmetry by providing a high signal-to-noise ratio to effectively reduce analyst fatigue, he says.

Read more>>
April 23, 2018

Streamlining Detection With Deception Technology

Deception is probably the least complicated way to detect threats that slip past perimeter defenses, says Ofer Israeli, CEO and founder of Illusive Networks. Deception can create detection asymmetry by providing a high signal-to-noise ratio to effectively reduce analyst fatigue, he says.

Read more>>
April 17, 2018

Cyber Security Challenges in the Healthcare Industry: The Top Experts Speak

A holistic approach to protecting personally identifiable information (PII) should be undertaken, involving people, processes and technology, alongside enhanced security. Organizations also need to incorporate fresh, proactive measures to surface attackers with speed and precision.

Read more>>
April 11, 2018

Illusive Networks New Breakthrough in Attack Surface Reduction: ASM

Illusive ASM discovers hidden elements throughout the network that enable lateral movement and otherwise facilitate advanced attacks.

Read more>>
March 29, 2018

A big chunk of Israel’s tech scene is actually not based in Israel

When success begets success in America, some find their home country is less a market than an incubator

Read More >
March 28, 2018

Israelis were behind three of the city’s five largest funding rounds last year: WeWork, Compass and Via.

Another reason cited by nearly every Israeli entrepreneur you talk to: the time zone, which makes having half your team in Israel a lot less punishing than if you were based in San Francisco. “Seven hours’ time difference and 10 hours’ time difference might not seem like a big difference, but it is,” says Ofer Israeli, chief executive of cybersecurity company Illusive Networks.

Read More >
March 27, 2018

Laying Traps In the Cloud

“In a very broad sense, the world has understood that yes, we want to control our perimeter, but if that’s no longer feasible, we need to detect hackers and respond as efficiently as possible,” said Ofer Israeli, founder and CEO of Illusive Networks

Read More >
February 1, 2018

As Amazon Expands in Israel, Contest for Talent Heats Up

when Israeli cybersecurity firm GuardiCore launched five years ago, its founders had little difficulty hiring people, thanks to their connections in the Israeli Defense Forces. But that changed when Amazon came to town and offered salaries to some employees of 25% to 50% more than GuardiCore was paying.

Read More >
January 17, 2018

Deception: Art or Science, Ofer Israeli, Illusive Networks

Hear the interview>
January 4, 2018

Casting an eye on the 2018 cyber landscape

Read More >
December 22, 2017

Deception Networks

Read More >
December 22, 2017

SWIFT Hackers Hit Russian State Bank

This, alongside the MoneyTaker ATM thefts, is further evidence that the availability of nation-state tools has proven cyber-intrusions inevitable,” said CEO and founder of Illusive Networks Ofer Israeli, via email. “Our research has uncovered one common weakness in all these attacks—regardless of how initial intrusion is achieved, once inside the gates, advanced professional hackers must move laterally to reach their targets. By understanding this, and focusing on identifying lateral movement, defenders can stop even the most sophisticated attackers before they reach an organization’s crown jewels, and do so before intrusion becomes a damaging and costly breach.”

Read More >
December 1, 2017

Illusive Networks: Trapping Advanced Persistent Threats with Deceptions Everywhere

Illusive Networks stops APTs at the lateral movement step by deploying decoys at every endpoint throughout the infrastructure. If the hacker falls for a single decoy, the Illusive technology then kicks into forensic mode, collecting information about it in order to identify and stop the attack.

Read More >
November 15, 2017

Deception Technology: Prevention Reimagined

How state-of-the-art tools make it practical and cost-effective to identify and engage attackers in early lateral movement stages to prevent them from reaching critical systems and data.

Read more >
October 30, 2017

Mil-spec infosec spinout Cryptonite reveals its network-scrambling tech

Deception-based technology from the likes of Illusive Networks and others as well as network-based intrusion prevention technology aims to combat similar threats.

Read More >
October 24, 2017

New Tool Debuts for Hacking Back at Hackers in Your Network

But a wave of deception technology startups such as Cymmetria, Illusive Networks, and TrapX, as well as veteran security firms, offer commercial products that allow organizations to be a bit more aggressive in their defenses with phony devices or fake data to lure and catch attackers in action.

Read More >
October 23, 2017

Wowee. Look at this server. Definitely keep critical data in there. Yup

Illusive Networks places extra network destinations and shares inside a server's deep data stores. An attacker lands on a decoy and looks where to go next, finding a mix of real and phoney destinations, which all look genuine.

Read more >
October 20, 2017

Illusive Networks’ New Mainframe Deception Addresses Missing Link to Secure Financial Services Against Sophisticated Cyber Attacks

As soon as attackers attempt to use the deceptive data, Illusive detects and alerts enterprise security teams, providing real-time, contextual forensic data from the source host that enable informed, targeted and timely incident response operations.

Read more >
October 17, 2017

Citi fosters Israeli fintech to meet changing needs of financial sector

Citi’s global venture arm has also invested in three Israeli startups: cybersecurity firm Illusive Networks, Dyadic Security and BlueVine, an online lender.

Read more >
October 17, 2017

Mainframe Security: Sometimes Overlooked, But Not by Hackers

Automatically generated and AI-driven, Illusive Networks' deceptions are tailor-made for the customer’s environment to appear realistic and authentic to attackers.

Read more >
October 11, 2017

Microsoft launches $5.5m AI funding competition

Behind loginMicrosoft Ventures was launched last year for the purpose of investing in start-ups, with its portfolio currently including Illusive Networks and Aqua Security.

Read more >
September 21, 2017

Automation is crucial for reducing costs and operational overhead – interview with Matan Kubovsky, VP of R&D at Illusive Networks

We provide real-time visualization of where the attacker is in relation to these risk sensitive assets... Illusive helps SOCs prioritize high-risk incidents, and eventually deal with the most urgent tasks.

Read more >
September 6, 2017

Nasdaq 100: Technology In The Driver’s Seat

Starting from the proposition that some hackers will find their way through traditional firewalls and other security obstacles, Illusive uses virtual and augmented reality technology to create a decoy version of a company’s network to trap hackers.

Read more >
August 4, 2017

Deception networks: Reducing alert fatigue and increasing security through an alternate reality

Deception networks take the honeypot concept to the extreme, creating fake administrator accounts, applications, and data that reside next to genuine components on the same machine.

Read More >
July 30, 2017

Illusive Networks says that deception everywhere is the way to go

Illusive networks pushes out deception data (user credentials, net connections, shares etc) to all systems on the network. This is done by an executable that runs periodically and then cleans up after itself. This means that every production system in the environment becomes part of the deception. This effectively corrupts the data that an attacker needs to continue to operate in an environment.

Read More >
July 28, 2017

33 Hot New Security Products Announced At Black Hat 2017

Israeli-security startup illusive networks announced an expansion of its deception technology solution at Black Hat with the launch of the External Incident Application Program Interface (API) and Risk Metrics tool.

Read More >
July 27, 2017

Top 100 Cybersecurity Startups in Q2 of 2017

The top 100 companies on the The Cybersecurity 500 list

Read More >
July 23, 2017

Malwarebytes, Minerva Labs, and EdgeWave – Enterprise Security Weekly #54

illusive networks launches its External Incident Application Program Interface

Read More >
July 18, 2017

5 questions with Team8

illusive networks looks at the biggest threat facing the cyber industry today - targeted attacks - and tries to solve it from the perspective of the attackers.

Read More >
July 17, 2017

The art of deception networks: New technique snares cyberattackers

“If we can accept that even with the best of threat prevention and detection, we will be breached, then adding deceptions can flip the paradigm,”

Read More >