1. Cobalt 101

    Cobalt Group: The 101

    Jason Reaves |

    The Fidelis Threat Research analysts have discovered a new version of ThreadKit, malware notorious for its use by the cybercrime organization known as Cobalt Group. This blog post is going to provide some insight into the group. If you want to dive straight into the detail of Fidelis research, c … READ MORE

  2. Don’t Let the Grinch Steal Christmas: A Timeline of Holiday Season Magecart Activity

    Danny Pickens |

    The retail, travel and hospitality industries face difficult security challenges year-round, but November through to the end of the year is the time that keeps the security professionals in these industries especially busy. The holiday shopping season is a time for financially motivated actors t … READ MORE

  3. Threat Hunting

    The Low Down on Threat Hunting

    Rae Jewell |

    Recently we announced our 2018 State of Threat Detection survey results and we picked up on some interesting trends around the subject of threat hunting. But what exactly is threat hunting? Who's doing it? And how can you do it too? Find out the answers below: What is threat hunting? Threat hun … READ MORE

  4. Extending Your Network Security to AWS

    Tim Roddy |

    Business and government IT workloads are rapidly transitioning from premises-based data centers to cloud service providers (CSPs). But challenges arise when CSP compute instances are unable to route network traffic at the speeds required by high-powered threat detection and data loss prevention … READ MORE

  5. Proactive Breach Detection

    It's Time to Seek: 3 Ways to Take Detection to a New Level

    Sam Erdheim |

    The year so far has been a busy one – crypto mining ishappening more frequently, thevolume ofcyberattacks is growing and cybercrime continues to be extremely well-funded. To top it off, with the number of devices being used, cybersecurity has never been more complicated. We’re seeing organiz … READ MORE

  6. VTAP

    We're Going Native: Introducing the Azure Virtual Network TAP

    Tim Roddy |

    This week at Microsoft Ignite, Microsoft called cybersecurity the “central challenge of the digital age,” and drew attention to the fact that organizations are spending valuable time and shifting “resources away from their core business mission to defend against, and recover from, cyberatt … READ MORE

  7. MDR vs. MSSP: Which Solution is the Right Fit for Your Organization?

    Rae Jewell |

    Often, we hear the term “Security as a Service” and itends up gettinglots of words thrown in front of it like Managed Security ServiceProvider (MSSP).Buyers should be aware though, thatanMSSP is often not the same as a Managed Detection and Response Service. The two are very different and th … READ MORE

  8. Deception Deployment Strategies for the Real World

    Tom Clare |

    In nature, deception has been used as both a combat and defense tactic for millennia. The angler fish resides deep in the lightless sea and lures its unwitting prey towards it with an extended dorsal spine - which resembles a fishing pole tipped with a luminous bait. Cyber criminals have been usi … READ MORE

  9. Data Exfiltration in Government Organizations

    Sam Erdheim |

    It’s no secret that US Government Agencies are feeling the pressure – with relentless cyber-attacks – both nation state and otherwise, they are having to strengthen their security posture like never before – in fact, the Federal government has just awarded a $1billion contract to Booz All … READ MORE