All Blog Posts
![Cover image of this blog post](https://clever-lebkuchen-c1d029.netlify.app/.netlify/images?url=images/posts/targets.png)
Three Threat Vectors to Watch for in H2 of 2024
Three Threat Vectors to Watch for in the second half of 2024, and their deceptive countermeasures
![Cover image of this blog post](https://clever-lebkuchen-c1d029.netlify.app/.netlify/images?url=images/posts/aiagent.png)
Misconceptions of AI-Driven Attacks in Infosec
Attackers won't need magical new techniques to succeed. This should worry us.
![Cover image of this blog post](https://clever-lebkuchen-c1d029.netlify.app/.netlify/images?url=images/posts/printnightmare.png)
Revisiting CVE-2021-34527, also known as PrintNightmare
Exploring how you can use older vulnerabilities as part of effective deception operations
![Cover image of this blog post](https://clever-lebkuchen-c1d029.netlify.app/.netlify/images?url=images/posts/frozen.webp)
Backlog Crisis at the National Vulnerability Database
The NVD is struggling with a backlog of thousands of unprocessed CVEs, impacting CPE to CVE mappings, and leaving defenders in the dark on the vulnerability risk potential of their assets.
![Cover image of this blog post](https://clever-lebkuchen-c1d029.netlify.app/.netlify/images?url=images/posts/zta.png)
Leveraging Deception in Zero Trust
Deception contributes to achieving Zero Trust and defend from within the network perimeter.
![Cover image of this blog post](https://clever-lebkuchen-c1d029.netlify.app/.netlify/images?url=images/posts/robochess.png)
What is Deception Technology
Deception technologies help security teams fight back by creating enticing decoy assets within their network that attackers can’t resist interacting with.
![Cover image of this blog post](https://clever-lebkuchen-c1d029.netlify.app/.netlify/images?url=images/posts/longtail.png)
Vulnerabilities Long Tail
While new vulnerabilities continue to be discovered at a staggering pace, attackers focus on a much broader temporal spectrum. After all, it does not really matter which vulnerability is exploited, and older exploits are usually broadly available and stable.