Attacks/Breaches

3/29/2017
04:15 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Cymmetria Releases MazeRunner Community Edition Update

March 28, 2017 – Cymmetria, a developer of comprehensive cyber deception solutions, today
announced the release of a brand new version of its MazeRunner Community Edition – a free
version of its Enterprise deception solution.

The widely-used cyber deception platform now has an API, scaling automation features,
Responder.py (Pass-the-Hash) breadcrumbs, Active Directory integration, and much more.

“We’re especially excited about two new features: a full API, and IoC and TTP sharing,” said
Gadi Evron, Founder and CEO of Cymmetria. “These features make MazeRunner much more
powerful and allow users to share with the community, much like they would with Snort
signatures.”

With over a thousand community users choosing to share data with Cymmetria, the company
has decided to create an open intelligence feed based on these IoCs.

The full API allows users to automate their use of MazeRunner. Example usages include taking
a feed from MazeRunner and integrating it with other solutions (from sandboxes and EDR
solutions to orchestration and devops systems), and integrating with a user’s SDN infrastructure
to automatically isolate an attacker.

The MazeRunner Community Edition is publicly available for private initiatives and research
endeavors at no cost or commitment to purchase. Commercial entities are allowed to use it for
30 days, following which they are limited to use 1 decoy and 10 breadcrumbs.

“We come from the trenches, and we give back to the community,” said Evron. “It’s very exciting
to see so many practitioners using the platform.”

The new Community Edition is immediately available to the public at large. The new version can
be downloaded from https://community.cymmetria.com .

You can join Cymmetria’s Slack channel for sharing in the community, discussion, and live
support. Invitation link:
https://mazerunnercommunity.slack.com/shared_invite/MTYxMTYxMjIzMzgyLTE0OTA2NTE0N
TgtNmFlYTFkNGVkNA


About Cymmetria:
Cymmetria is a startup offering a pioneering cyber deception solution, based on breadcrumbs
and decoys that lead attackers away from valuable targets. With Cymmetria, organizations gain
the ability to detect threats, shape attacker behavior, and mitigate attacks. Founded in 2014 by
security experts Gadi Evron and Dean Sysman, Cymmetria is changing the asymmetry of cyber
security, tilting the traditional security odds so that hackers are the ones left vulnerable.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
Mueller Probe Yields Hacking Indictments for 12 Russian Military Officers
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/13/2018
10 Ways to Protect Protocols That Aren't DNS
Curtis Franklin Jr., Senior Editor at Dark Reading,  7/16/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Siri??  You're a guy?
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2016-10727
PUBLISHED: 2018-07-20
camel/providers/imapx/camel-imapx-server.c in the IMAPx component in GNOME evolution-data-server before 3.21.2 proceeds with cleartext data containing a password if the client wishes to use STARTTLS but the server will not use STARTTLS, which makes it easier for remote attackers to obtain sensitive ...
CVE-2018-8018
PUBLISHED: 2018-07-20
Apache Ignite 2.5 and earlier serialization mechanism does not have a list of classes allowed for serialization/deserialization, which makes it possible to run arbitrary code when 3-rd party vulnerable classes are present in Ignite classpath. The vulnerability can be exploited if the one sends a spe...
CVE-2018-14415
PUBLISHED: 2018-07-20
An issue was discovered in idreamsoft iCMS before 7.0.10. XSS exists via the fourth and fifth input elements on the admincp.php?app=prop&do=add screen.
CVE-2018-14418
PUBLISHED: 2018-07-20
In Msvod Cms v10, SQL Injection exists via an images/lists?cid= URI.
CVE-2018-14419
PUBLISHED: 2018-07-20
MetInfo 6.0.0 allows XSS via a modified name of the navigation bar on the home page.