Shadow figment Blog Terms - Attivo Networks

Shadow figment

Cybersecurity software tool uses trickery to ward off potential threats from hackers

Researchers at the Pacific Northwest National Laboratory have come up with a cybersecurity software tool that builds on the old notion of honeypots, a way of tricking hackers into thinking they’ve gotten into your systems. The new technology is called Shadow Figment. Thomas Edgar, the labs senior cybersecurity scientist, joined Federal Drive with Tom Temin to talk about how it …

Cybersecurity software tool uses trickery to ward off potential threats from hackers Read More »

Homeland Security Today Logo

Cybersecurity Researchers Develop Technology That Lures and Traps Hackers In an Artificial World

Scientists have created a cybersecurity technology called Shadow Figment that is designed to lure hackers into an artificial world, then stop them from doing damage by feeding them illusory tidbits of success. The aim is to sequester bad actors by captivating them with an attractive—but imaginary—world. The technology is aimed at protecting physical targets—infrastructure such …

Cybersecurity Researchers Develop Technology That Lures and Traps Hackers In an Artificial World Read More »

Geek Wire logo

Researchers create ‘Shadow Figment’ cybersecurity decoy tech that lures attackers into a fake world

Over the past several years, hackers have increasingly targeted the physical systems we rely on to run our society. Electrical utilities, food processing plants, and aluminum producers are only a few of the industries that have recently been attacked, resulting in tremendous supply chain disruptions. Fortunately, innovative research at Pacific Northwest National Laboratory is bringing …

Researchers create ‘Shadow Figment’ cybersecurity decoy tech that lures attackers into a fake world Read More »

Decoy system diverts hackers from critical infrastructure

Scientists at the Pacific Northwest National Laboratory have created a cybersecurity technology designed to stop hackers from damaging critical infrastructure networks by luring them instead into an artificial world and feeding them false signals of success. Shadow Figment is based on honeypots, which attract hackers by providing what appears to be an easy target so …

Decoy system diverts hackers from critical infrastructure Read More »

Scroll to Top