1. WannaCry

    WannaCry Hits 150+ Nations Worldwide

    Early on Friday, May 12, reports began circulating about WannaCry ransomware outbreaks in the United Kingdom affecting numerous sites at the National Health Service (NHS). Soon after, it became apparent that the impact was global, affecting a large number of victims across Europe, Middle East and … READ MORE

  2. Blackmoon malware framework blog

    Blackmoon Rising: Banking Trojan Back with New Framework

    Banking trojans – true to their name – typically steal web credentials from users of financial services websites. Targeted services can include banks, wealth management firms, investment banks, retirement investment services companies and others – essentially any website where money can be … READ MORE

  3. Detecting Threats with “Whole-Brain” Cybersecurity Technology

    From the CTO’s Desk: Detecting Threats with “Whole-Brain” Technology

    I’ve been designing and programming computer systems for a long time (longer than I’m willing to admit in a public blog post). On many occasions throughout my career I’ve come across problems that were proving to be very difficult (if not impossible) to solve using pure combinatorial logic … READ MORE

  4. Reducing Detection from Months to Minutes: Detecting Credentials in the Clear

    Welcome back to our blog series on reducing detection time from months to minutes. In our first and second posts, we showed how you can use metadata to quickly resolve phishing attacks and investigate threats retroactively. While those two scenarios are pretty common, here’s one that may be new … READ MORE

  5. Operation TradeSecret: Cyber Espionage at the Heart of Global Trade

    In late February, Fidelis Cybersecurity observed a strategic web compromise on a prominent U.S. lobbying groupthat served up malware to a very specific set of targets. The malware we observed has been used exclusively by Chinese nation-state threat actors in our observation and according to previ … READ MORE

  6. Going Back in Time: Investigating Threats Retroactively

    Welcome back to reducing detection time from months to minutes. In the first post in this series, we showed how metadata holds the power to quickly disarm one of the most effective cyberattack methods in the attackers’ arsenal – phishing. But what about detecting threats in the past? You’v … READ MORE

  7. CISO, Welcome to the Boardroom: New Regulations Likely to Impact CISO Role

    Interesting changes are happening in the world of cybersecurity legislation. Notably, these changes are impacting the role of the chief information security officer (CISO). No longer are CISOs just the sacrificial lamb (read: scapegoat) when a company suffers a data breach. The changes revolve a … READ MORE

  8. Using Yara for Intrusion Prevention

    Nviso Labs recently published a fascinating blog post illustrating the use of the Lua programming language over the Suricata DPI engine to detect obfuscations in PDF files. Deep analysis of content seen on networks is a topic close to our heart at Fidelis Cybersecurity. After reading that post, … READ MORE

  9. Phind the Phish - Reducing Phishing Detection from Months to Minutes

    Every day, attackers tunnel under, sneak through, go around, go over and squeeze past your security technologies. While you’re armed with more security tools than you can count, most of them are hiding a dirty little secret: They actually create more work for people, not less. Security teams a … READ MORE