1. Tuesday, January 12, 2016
    Watch out! Your company can be slapped with fines and penalties even without a data breach. Recent litigation and notifications around the loss or misuse of corporate data are on the rise. Companies holding PCI data, PII or PHI are all high-value targets for cyber criminals, especially in the financ... READ MORE
  2. Wednesday, January 6, 2016
    Major data breaches exploded in 2015 as hacktivists, cybercriminals and nation states set their sights on stealing troves of sensitive information and proprietary data. Evolving malware, as we saw with AlienSpy RAT reemerging as JSocket RAT, kept cybersecurity professionals on the lookout and vigila... READ MORE
  3. Wednesday, December 23, 2015
    Over the past few months, we have seen Angler Exploit Kit activity increase across our observed telemetry. In some instances, Angler EK relies on redirects (also known as “gates”) to funnel victim traffic to its landing pages. In others, Angler EK does not use redirect techniques but instead sends v... READ MORE
  4. Tuesday, December 22, 2015
    Over the last several months we had the opportunity to engage in many conversations with both customers and IT security leaders about the events happening in the security market. Cyber warfare took new meaning in 2015 and left lethal destruction in its path. As we wind down and head into the New Yea... READ MORE
  5. Monday, December 21, 2015
    In 2014, we predicted that 2015 would be “The Year of the Breach” and it didn’t disappoint. Companies faced attacks from every possible angle: real world terrorist organizations, nation states, hacktivists, organized crime, insiders and in some cases, their very own governments. We asked Fidelis Cyb... READ MORE
  6. Wednesday, December 16, 2015
    Last month, CrowdStrike published a blog on malware campaigns attributed to Sakula. We took a look at the malware specifically in the INOCNATION campaign to analyze what was new and different about the techniques used by the threat actor. It appears the entity behind this campaign took steps to make... READ MORE
  7. Wednesday, December 9, 2015
    It’s become widely accepted that security incidents are inevitable for any organization that has valuable data. Detecting security incidents early in the attack lifecycle is vital to reducing risk, yet most security breaches go undetected until it’s too late, and an outside incident response team is... READ MORE
  8. Wednesday, November 25, 2015
    As a cybersecurity professional, I’m constantly on guard against online attacks and diligently protect my personal data. But for every professional like me who takes cybersecurity seriously, there are thousands of unsuspecting shoppers who lack the basic knowledge needed to protect themselves from s... READ MORE
  9. Tuesday, November 17, 2015
    Earlier this month, the media covered an FBI presentation on ransomware . What was noteworthy was that the FBI warned that because ransomware encryption is so good, the easiest thing for victims to do may be to pay the ransom to recover their files. Such advice has spurred a debate in the security c... READ MORE