BitTrap | October 05, 2021
Startup company BitTrap has announced a blockchain-based cybersecurity solution that leverages attackers' motivations to provide singular detection capabilities. This approach differs from cybersecurity paradigms that focus on trying to keep attackers from breaking in. Instead, it assumes some have already made their way inside a network, undetected, and is designed to identify them and reduce hacker dwell time in the compromised system.
The system works by deploying a vast network of wallets in every endpoint or cloud instance. Each wallet contains a risk-adjusted bounty of cryptocurrency assets calibrated, based on research from the BitTrap Attacker Behavioral Labs, to ensure it will capture an attacker's attention. Collecting the bounty triggers an incident-response operation that alerts the organization of the breach, effectively causing the hacker to reveal their presence. The vulnerability can be quickly assessed and patched while avoiding ransomware and data exfiltration altogether.
BitTrap began operations in 2020 after cyberattacks multiplied during the global pandemic. The company's founders, who combine decades of industry experience in cybersecurity and expertise in attacker behavior, developed the groundbreaking technology to help companies actually benefit from cyberattacks. "It is very important to capitalize on security incidents, using each opportunity to learn and prioritize efforts," said BitTrap CTO Ariel Futoransky. "We need to understand our adversaries' main motivation and use it to overcome our challenges and reduce the impact of attacks. With our unique approach, we can tackle both issues at the same time. We go a long way beyond intrusion detection or deception."
The company is particularly proud of the new solution. Through the company's Attacker Behavioral Labs, Altszul said, "We intend to keep investing and developing the most sophisticated capacity in the industry to understand attacker behavior. After our initial success, we are getting ready to raise a new round of financing to fuel our expansion in the market.
BitTrap CEO Jonatan Altszul
BitTrap is a cybersecurity solution company with a groundbreaking crypto approach, changing how companies face and resolve attacks while saving money along the way. BitTrap triggers immediate alarms using risk-adjusted economic incentives to reveal vulnerabilities without compromising performance. We go far beyond deception technology.
chamberbusiness | May 06, 2020
In recent weeks reveal the need for businesses to double down on security to ensure their networks are protected, a leading cyber security expert said. .
Many of the attacks were ransomware, holding companies’ network systems hostage until a payout was made. .
Under COVID-19, cyber criminals are having a field day, honing in on companies in countries like the United States that are in the throes of fighting the virus..
An uptick of coronavirus-themed cyber attacks on hospitals, pharmaceutical laboratories and even the trucking industry in recent weeks reveal the need for businesses to double down on security to ensure their networks are protected, a leading cyber security expert said. Many of the attacks were ransomware, holding companies’ network systems hostage until a payout was made. Some companies, particularly small and mid-sized businesses, might not survive such an attack, said John Zanni, CEO of Scottsdale-based Acronis SCS, a leader in edge data security and cyber protection in the U.S. public sector.
Zanni strongly advises organizations to beef up network safety. The cost is minimal and today’s technology is highly effective. A large organization that has its IT system knocked out can pay in the “hundreds of thousands to millions of dollars” to fly in a forensics firm to fix the damage, Zanni said. For smaller private sector entities, the cost can put them out of commission.
Learn more: SINGLE LAYERS OF SECURITY AREN’T ENOUGH TO PROTECT YOUR ORGANIZATION’S DATA .
“The pandemic has increased impacts on businesses significantly. Unfortunately, many are not equipped to deal with them” .
~ Zanni says
A large organization that has its IT system knocked out can pay in the “hundreds of thousands to millions of dollars” to fly in a forensics firm to fix the damage, Zanni said. For smaller private sector entities, the cost can put them out of commission.“If someone breaks into your business, you call 911,” he said. “If you call 911 and say, ‘I’m suffering a ransomware attack,’ they don’t know what to do. It’s a big problem.” COVID-19 has brought the issue into the limelight as more employees work from home, doctors conduct telemedicine appointments, and online purchases soar.
“So now we’re all working at home and the bad guys have realized there are a lot of holes in being connected to a corporate network or other business from home systems.”
Under COVID-19, cyber criminals are having a field day, honing in on companies in countries like the United States that are in the throes of fighting the virus. To illustrate the threat, only 190 domain names included the word ‘corona’ last year, Zanni said. In March, there were more than 30,000. “Some are legitimate but most of them are not,” he said. “We’ve also seen a 127 percent increase in exposed desktop protocol endpoints. Anyone with connectivity is at risk. Phishing scams claiming to be from the Centers for Disease Control and the World Health Organization are a common ruse right now.
While all businesses are at risk, the majority of cyber attackers target government agencies in search of sensitive data, Zanni said. That impacts businesses as well. When Baltimore had to shut down operations after a cyber attack last year, companies were unable to carry out everyday transactions like getting permits approved and bills paid. The city lost millions of dollars in potential and delayed revenue. Atlanta and New Orleans also were hit by cyber attacks in the past two years, also costing millions of dollars in recovery costs.
HOW ORGANIZATIONS CAN PREPARE FOR CYBERSECURITY
Robo Shadow | September 27, 2021
UK based Cyber Security start-up, Robo Shadow, have launched their initial product set as they attempt to take on the big guns in Cyber Security. The Platform boasts a range of features including Vulnerability Scanning, Hardware and Software reporting for all your devices, reporting on Windows Defender centrally (removing the need for third-party Anti-virus) and much more.
We want to democratise Cyber Security, by removing the cost and the complexity.The Robo Shadow Cyber Platform effectively is an attack surface management platform aimed at helping organisations quickly understand their cyber-attack surface. This is so people can See what the hackers see when they are planning their attacks. The easy-to-use Platform will also give all the helpful hints in closing the vulnerabilities that Penetration Tests and Vulnerability Assessments uncover. This cutting-edge software has a straightforward approach to how Cyber Information is displayed and digested by the users, supported by an extensive AI-driven cloud backend.
Terry Lewis, CEO and prolific tech investor
When asked about the commercial model for Robo Shadow, the team states: "We want people to use our software for free and will only have to pay if they require advanced services like support, penetration testing and consultancy. That way, anyone can get the free tech they need, whether they are a School, Business or even a Government Institution. If need be, they can pay for a subscription to use our internal team to help support and advise on the cyber outputs generated by the Platform. Free users to the Platform will still have access to developer style support."
Currently, the initial offering has everything from Vulnerability Scanners, Windows Defender Agents and Office 365 integration. Future versions of the Platform will include Google, Microsoft & Amazon Cloud Integration, Mac and Linux Cyber Agents and an array of technology for businesses to manage their Cyber-attack surface and deliver daily Sec Ops aspect to their business.
The team have enjoyed a decent first run boosted and helped by their popular Android App available in the App store. The App allows people to remotely scan their networks both inside and out for vulnerabilities to understand their attack surface better. Originally the Android App was built as a proof of concept to demonstrate how simple the tech needs to be to make a significant effect in helping people understand their Cyber Attack surface.