1. Tuesday, November 3, 2015
    by John Bambenek To see the full threat report and findings, visit Fidelis Threat Advisory #1019 Ratcheting Down on JSocket: A PC and Android Threat . The report includes analysis of PC capabilities and an updated list of observed JSocket Command-and-Control nodes observed in the wild. Enterprises s... READ MORE
  2. Thursday, October 29, 2015
    By Mike Buratowski Recent attacks on Hillary Clinton, CIA Director John Brennan and Department of Homeland Security Secretary Jeh Johnson reveal the conflicting issues involving federal and law enforcement agencies. In the private sector, the fallout from the highly publicized JPMorgan Chase breach... READ MORE
  3. Wednesday, October 28, 2015
    by Ryan Vela In our last post , Resolution1 Endpoint conquered malware in a *nix environment. In this installment, we explore how Resolution1 Endpoint can help you hunt for attackers across all operating systems. When it comes to hunting, you need the visibility to find what you’re hunting for and t... READ MORE
  4. Wednesday, October 28, 2015
    By Ryan Vela Having witnessed the performance of Resolution1 Endpoint 5.8 in action via a Windows and *nix environment, I am definitely excited about the new release. And here’s why. The Fidelis Consulting Services team was recently called in by an information technology firm to hunt for IOCs on a l... READ MORE
  5. Wednesday, October 28, 2015
    By Peter George, President and CEO We’ve been busy here at Fidelis. How busy? Well, you can measure it any number of ways. One important metric is growth. During the first nine months of the year, Fidelis grew revenue 52 percent on a year-over-year basis. A second important metric is who we are prot... READ MORE
  6. Tuesday, October 27, 2015
    In our last post we examined the best practices in responding to a cyberattack with a from-the-trenches case study. We close out this series with hard-hitting, practical advice on mitigating cyberattacks from guest contributor, Brian Kelly, Chief Security Officer with Rackspace. Concerned about how... READ MORE
  7. Friday, October 23, 2015
    As President Xi wraps up his tour in Britain, news continues to circulate around the Chinese government arrest of hackers suspected of conducting commercial cyber espionage against U.S. companies. The arrests allegedly occurred two weeks prior to Xi’s visit to the United States, a period when the Un... READ MORE
  8. Friday, October 23, 2015
    In our last post , we focused on knowing the enemy. In this installment we explore the best practices in responding to an attack by an advanced persistent threat (APT) actor with a from-the-trenches incident response case study. Responding to an incident requires careful orchestration. You have to a... READ MORE
  9. Thursday, October 22, 2015
    Recently, Apple stated its opposition to a controversial cybersecurity bill in which initial amendments passed today in the Senate. The Cybersecurity Information Sharing Act (CISA) has been marketed as the most important, comprehensive and viable bipartisan bill tackling cybersecurity [this legislat... READ MORE