1. As criminals continue their relentless ransomware attacks on healthcare providers, organizations are asking how to prepare and minimize the impact of an attack. What can an organization do to bolster their defenses? Prepare! We advise the following strategy to handle a ransomware incident: 1. Ass … READ MORE

  2. Ransomware attacks targeting the healthcare community are sending shockwaves through the industry. In late March, Washington DC-based MedStar Health became the latest in a series of providers to fall victim to ransomware. The impact of a network-wide ransomware attack grinds operations to a stand … READ MORE

  3. In the summer of 2015, Fidelis Cybersecurity had the opportunity to analyze a Derusbi malware sample used as part of a campaign we’ve labeled Turbo, for the associated kernel module that was deployed. Derusbi has been widely covered and associated with Chinese threat actors. This malware has be … READ MORE

  4. The adoption of Microsoft Office 365® continues to flourish among businesses of all sizes. The benefits in terms of improved functionality, simplicity, productivity and a reduction in IT expenditures make a compelling case – especially when it comes to managing email communications. Office 365 … READ MORE

  5. Security analysts and threat researchers are invited to watch the recorded webinar Dissecting the Malware Involved in the INOCNATION Campaign detailing our investigation of INOCNATION and the new malware variant Hi-Zor. Watch the webinar. In Fidelis Threat Advisory #1020 (FTA), we provided compre … READ MORE

  6. This month, a multi-national law enforcement team led by Europol arrested a key player believed to be behind the 2015 distributed denial of service (DDoS) extortion attacks by the criminal gang DD4BC (short for Distributed Denial of Service for Bitcoin). The gang formed in 2014 by targeting onlin … READ MORE

  7. Watch out! Your company can be slapped with fines and penalties even without a data breach. Recent litigation and notifications around the loss or misuse of corporate data are on the rise. Companies holding PCI data, PII or PHI are all high-value targets for cyber criminals, especially in the fin … READ MORE

  8. Major data breaches exploded in 2015 as hacktivists, cybercriminals and nation states set their sights on stealing troves of sensitive information and proprietary data. Evolving malware, as we saw with AlienSpy RAT reemerging as JSocket RAT, kept cybersecurity professionals on the lookout and vi … READ MORE

  9. Over the past few months, we have seen Angler Exploit Kit activity increase across our observed telemetry. In some instances, Angler EK relies on redirects (also known as “gates”) to funnel victim traffic to its landing pages. In others, Angler EK does not use redirect techniques but instead … READ MORE