1. Decrease well time

    This is part of a Black Hatinterview with Hardik Modi, Vice President Threat Intelligence thatoriginally ran on https://www.blackhat.com/sponsor-interview/05262017.html#fidelis Question: Organizations are under increasing pressure to improve incident detection and to reduce dwell-times. What are … READ MORE

  2. When to Decrypt

    This is part of a Black Hatinterview with Hardik Modi, Vice President Threat Intelligence thatoriginally ran on https://www.blackhat.com/sponsor-interview/05262017.html#fidelis Question: There's been a push to encrypt everything on the Internet in recent years. How are threat actors exploiting t … READ MORE

  3. Emotet takes wing with a spreader

    Introduction The recent Wannacry and Petya outbreaks have demonstrated the potency of ransomware coupled with a propagation component (spreader). While typical ransomware infections lead to the denial of access of data on a single victim system, it becomes an enterprise threat when it can propag … READ MORE

  4. From Detection to Remediation: A Case Study with RIG

    Recently, our partner Exatel published its latest research project outlining its investigation following an alert from Fidelis Network, which identified a RIG exploit kit traffic traversing a network. This isn’t interesting, per se, as exploit kit traffic is common in most environments. What ma … READ MORE

  5. Fidelis At Black Hat 2017

    We're gearing up for Black Hat USA 2017. As you pack your bags and plan ahead, be sure to check out Fidelis – we’ve got demos, advanced technology and smart people. We’re also your stop for cool swag (hint hint!). Oh yeah, and we have pinball. Here’s a look ahead at what we’ll be up to … READ MORE

  6. Researchers have observed TinyLoader, a well-known backdoor, delivering point-of-sale and banking trojan malware over the past few years. Fidelis Cybersecurity Threat Research happened to notice it delivered from a site that hosted a variety of other malware and that was an association we had not … READ MORE

  7. UPDATE: 2:00 pm EDT,June 28, 2017:During subsequent research, the initial infection vector isn't believed to involve Word/RTF files or the CVE-2017-0199 exploit.Further research has also revealed that there is a separate propagation vector involving SMB transfers and execution usingpsexec. Fidel … READ MORE

  8. Political hacks have many lessons for the business world. Political cyberattacks have taken many different forms over recent months, starting from theDemocratic National Committee (DNC) hack, which appears to have been the work of Russian nation-state hackers to cause disruption and controversy … READ MORE

  9. Are you heading to Infosecurity Europe in Olympia, London on 6-8 June.? We are. In fact, Fidelis Cybersecurity will be showcasing advanced security technology to stop modern intrusions, solve alert fatigue and cut the time to detect, validate and resolve alerts from days to minutes. We welcomeCS … READ MORE