-
-
A new way to defend against identity-based attacks
Identity-based attacks are front and center, and here to stay. Our stale defenses are in need of improvement. I just finished listening to General Haugh and General Nakasone on State Secrets podcast, hosted by Suzanne Kelly, titled “Two Generals and a Cyber Warning for America” – Two Generals and a Cyber Warning for America – TheCipherBrief….
-
Compliance has never been so fun
Leveraging In-Use Deception to Align with NIST 800-172 Enhanced Security Requirements At Frenetik, our approach to cybersecurity isn’t simply reactive; it’s proactive, strategic, and deeply aligned with emerging compliance frameworks. Building upon our previous discussions about In-Use Deception and turning counter-reconnaissance into a strategic advantage, we’re highlighting how Frenetik’s specific deception capabilities directly address key…
-
Introducing In-Use Deception
Deception in Motion: How “In-Use Deception” Changes Cybersecurity Forever Cybersecurity professionals have long relied on deception methods—such as honeypots, canary tokens, and static fake servers—to identify lurking adversaries. However, as attackers grow more sophisticated, there’s a need for complementary strategies that enhance these traditional methods. Enter **In-Use Deception**, a proactive technique that integrates seamlessly with…
-
Dangerous Patterns
Dangerous Patterns: Breaking the Static Identity and Hostname Vulnerability Introduction In the cybersecurity battleground, adversaries thrive on predictability. One of the most significant weaknesses exploited today is the inherent predictability of static identity and hostname conventions. Organizations inadvertently make reconnaissance simple by using predictable usernames and resource hostnames. This predictability allows attackers to automate reconnaissance,…