-
Resources
-
Page
Log4j Deception
-
General Interest, TrapX blog
Using DeceptionGrid to Detect and Defeat Exploits of Log4j Remote Code Execution (RCE) Vulnerability
Cybercriminals never rest and already exploit the newly-disclosed Apache Log4j RCE vulnerability. Learn how DeceptionGrid™ reduces risks when cybercriminals attempt to leverage this or other vulnerabilities.
-
General Interest, TrapX blog
Deception – A Shield Between Vulnerability Disclosure and Patch Deployment: The Case of CVE-2021-22005
The time between vulnerability disclosure, patch release and patch deployment is critical. IT organizations and departments are in an endless race with cybercriminals to close the gap.
-
General Interest, TrapX blog
Attacks on Healthcare Organizations: Was the Writing on the Wall?
The Ryuk ransomware attack on Universal Health Services (UHS) and the recent attacks on Hillel Yaffe and on nine more hospitals in Israel again highlights how vulnerable the medical sector is to ransomware targeted attacks.
-
General Interest, TrapX blog
Defending crown jewel assets such as Active Directory Domain Controllers from Breaches
Active Directory domain controllers are among the most common critical assets in organizations and are considered also by Cybercriminals to be the crown jewels of the organization.
-
General Interest, TrapX blog
Defending Against Cisco Authentication Bypass Vulnerability Exploits
TrapX DeceptionGrid deceives and traps attackers exploiting Cisco vulnerabilities, including the latest critical Vulnerability in Cisco NFV Infrastructure Software (NFVIS).
-
General Interest, TrapX blog
Staying Strong Despite Vulnerabilities
No system is 100% foolproof – all systems have weaknesses: humans get sick, cars break down and elevators get stuck. Sometimes these weaknesses can be fixed quickly; other times, a fix might take considerable time or may not be feasible.
-
General Interest, TrapX blog
TrapX DeceptionGrid Deceives and Traps Attackers Exploiting Latest Vulnerabilities
Attackers who attempt to exploit latest Windows vulnerabilities PrintNightmare and HiveNightmare (SeriousSAM) are deceived and detected by TrapX DeceptionGrid.
-
General Interest, TrapX blog
Securing Containers: The NSA perspective
NSA publishes recommendations for hardening Kubernetes.
Learn more about our unique approach to Deception
Discover why more than 300 global customers call TrapX "simple, powerful, and affordable."