Endpoint Defensive & Offensive Deception

Tricks used by malware authors to protect their malicious code from detection

In our last two posts we’ve shown how vendors like Symantec and Microsoft (among others) miss detecting threats due to the nature of how their engines operate. So how do malware authors know if an environment is safe for them to attack or not? There are plenty of indicators about a system that they check Read more about Tricks used by malware authors to protect their malicious code from detection[…]

Deceptive Bytes found detection issues in Microsoft’s Windows Defender

Symantec’s Endpoint Protection is not the only Anti-malware engine that has issues related to detection, as we stated before. We have found issues with Microsoft’s Windows Defender engine, which is integrated into Windows since Vista. Test-case: Microsoft Windows Defender Let’s look at Windows Defender and cases where it missed detecting potential threats. Malicious macros In Read more about Deceptive Bytes found detection issues in Microsoft’s Windows Defender[…]

Deceptive Bytes found detection issues in Symantec Endpoint Protection

In previous posts we explained that traditional Anti-malware software is not working anymore and we gave tips on how to improve your security with non-security tools. But why is your Anti-malware not enough? One of the reasons is that it doesn’t handle changes too well (which is commonplace knowledge among security experts). Background Malware uses Read more about Deceptive Bytes found detection issues in Symantec Endpoint Protection[…]

CB Insights selected Deceptive Bytes as one of the most promising startups in cyber security

CB Insights published their early-stage cyber security (startups) periodic table, stating that the selected companies are considered as the leading startups across different emerging sectors, you can find Deceptive Bytes under deception security. “We put together a periodic table of early-stage cybersecurity that spotlights the industry’s most promising young startups, emerging industry categories, and most active investors.”

Improve your security without installing additional security software

There are various security measures you can take in order to protect your endpoint, some might be heavy on the machine and not necessarily that helpful, for instance, the traditional antivirus is only 20-40% effective, according to CheckPoint’s blog post from last year. Nevertheless, we do advise having some sort of security on your endpoint Read more about Improve your security without installing additional security software[…]

Deceptive Bytes is participating in CyLon accelerator

It’s been a while since we posted but we’ve been very busy presenting at CyberTech’s pavilion, meeting Gartner’s Avivah Litan, interviewing with accelerators and much more. We’re happy to officially announce that Deceptive Bytes was selected and is currently participating in CyLon accelerator’s fifth cohort. Different online media sources like Private Equity Wire, Tech City Read more about Deceptive Bytes is participating in CyLon accelerator[…]

Simple tricks to improve your online security

2017 just started and it’s a great opportunity to remind you of ways to keep yourself and your devices (computers, smartphones and other connected devices) safe online: Make sure you have security products installed (Antivirus, Firewall, …) and kept up-to-date constantly. Stay updated, keep your operating system, drivers and software up-to-date since updates fix security Read more about Simple tricks to improve your online security[…]