1. RSA 2017: Join Fidelis Cybersecurity in San Francisco

    We're counting down the last few days to RSA 2017. As you pack your suitcase and map outyour schedule, plan on joining us for a demo atBooth #933. Stop by and say hello and grab your limited edition t-shirt. Here’s a quick rundown on where you can find us: RSA 2017 EXPO: Join Fidelis Cybersecur … READ MORE

  2. Spying on GoldenEye Ransomware

    Producers of the 1995 James Bond film “GoldenEye” packed the plot with all the signature elements fans expect from the successful franchise. Over-the-top supervillain – check. Coolspy gadgets – check. Exotic locations – check. And, of course, 007 saves the day. The film was also slight … READ MORE

  3. Five Security Trends to Watch in 2017

    What does 2017 hold for security professionals and the industry as a whole? To answer this question, let’s take a quick look at what has not changed. For one, ransomware continues to be an effective extortion tool for attackers. They’re constantly honing their ability to use backdoors and ro … READ MORE

  4. Revenge of the DevOps Gangster: Open Hadoop Installs Wiped Worldwide

    Earlier this month, security news media reported attackers holding internet-exposed MongoDB and Elasticsearch databases for ransom. Attackers said they’d return the data if they got paid -- otherwise, the data would be erased. In many reported instances, attackers simply deleted the data. Unfo … READ MORE

  5. Sorting Out the Next Generation of Security

    Security got the boring end of the stick when names for the generations were handed out. Instead of Millennials, Gen X, Baby Boomers or the Greatest Generation, we're stuck with "Next Gen." What comes after "Next Gen"? And where were the creative minds hiding when we needed them most? In this pos … READ MORE

  6. The Best of Both Worlds: A New Approach to Endpoint Security

    There are two types of runners: long-distance runners and sprinters. Everything about them is different. Sprinters are built for power while marathoners are built for endurance. But what if you could break the mold and find all of those capabilities in a single athlete? Endpoint detection and re … READ MORE

  7. Did You Hire Your IPS for a Job of the Past?

    In Part 1 of this series we asked the question: Would you re-hire your IPS if you interviewed it today? But it’s not a totally fair question. Because, before you hire someone (or in this case buy something) it’s pretty obvious that you need a deep and thorough understanding of what the job en … READ MORE

  8. Vawtrak DGA Round 2

    Vawtrak, a.k.a. Neverquest, has been a prominent trojan in the banking world and numerous researchers have reported their findings about this malware. In August 2016, we blogged about the addition of a DGA to the banking trojan known as Vawtrak. The actors behind Vawtrak reacted to this attention … READ MORE

  9. Down the H-W0rm Hole with Houdini's RAT

    Commodity Remote Access Trojans (RATs) -- which are designed, productized and sold to the casual and experienced hacker alike -- put powerful remote access capabilities into the hands of criminals. RATs, such as H-W0rm, njRAT, KilerRAT, DarkComet, Netwire, XtremeRAT, JSocket/AlienSpy/Adwind and o … READ MORE