1. Widespread Exploitation Attempts Using CVE-2017-5638

    Many research teams have reported on their observations of exploits involving the use of the Apache Struts vulnerability CVE-2017-5638 since Cisco Talos published their post on Wednesday March 8. Fidelis Cybersecurity Threat Research is also seeing widespread activity and contrary to some report … READ MORE

  2. Modern Messaging OPSEC: Popular App Gives Scammers a Boost

    Modern messaging apps, many of which offer end-to-end encryption, are used every day by millions of people. These apps come with the expectation of privacy. However, we recently observed an interesting operational security issue involving one such popular messaging app, Telegram. We're posting ou … READ MORE

  3. Understanding the SmokeLoader Downloader

    Downloaders and droppers (aka malware that delivers other malware) have been forced to live in the shadow of more famous stages of the exploit kit chain, like landing pages or the malware that's eventually dropped. One reason they are often overlooked and not analyzed as often is because they ty … READ MORE

  4. RSA 2017: Join Fidelis Cybersecurity in San Francisco

    We're counting down the last few days to RSA 2017. As you pack your suitcase and map outyour schedule, plan on joining us for a demo atBooth #933. Stop by and say hello and grab your limited edition t-shirt. Here’s a quick rundown on where you can find us: RSA 2017 EXPO: Join Fidelis Cybersecur … READ MORE

  5. Spying on GoldenEye Ransomware

    Producers of the 1995 James Bond film “GoldenEye” packed the plot with all the signature elements fans expect from the successful franchise. Over-the-top supervillain – check. Coolspy gadgets – check. Exotic locations – check. And, of course, 007 saves the day. The film was also slight … READ MORE

  6. Five Security Trends to Watch in 2017

    What does 2017 hold for security professionals and the industry as a whole? To answer this question, let’s take a quick look at what has not changed. For one, ransomware continues to be an effective extortion tool for attackers. They’re constantly honing their ability to use backdoors and ro … READ MORE

  7. Revenge of the DevOps Gangster: Open Hadoop Installs Wiped Worldwide

    Earlier this month, security news media reported attackers holding internet-exposed MongoDB and Elasticsearch databases for ransom. Attackers said they’d return the data if they got paid -- otherwise, the data would be erased. In many reported instances, attackers simply deleted the data. Unfo … READ MORE

  8. Sorting Out the Next Generation of Security

    Security got the boring end of the stick when names for the generations were handed out. Instead of Millennials, Gen X, Baby Boomers or the Greatest Generation, we're stuck with "Next Gen." What comes after "Next Gen"? And where were the creative minds hiding when we needed them most? In this pos … READ MORE

  9. The Best of Both Worlds: A New Approach to Endpoint Security

    There are two types of runners: long-distance runners and sprinters. Everything about them is different. Sprinters are built for power while marathoners are built for endurance. But what if you could break the mold and find all of those capabilities in a single athlete? Endpoint detection and re … READ MORE