1. Monday, October 17, 2016
    Metadata is data that describes other data. And while it may not sound sexy, metadata gathered from your network can be a powerful ally in the battle against cyberattacks. READ MORE
  2. Saturday, October 15, 2016
    In November 2015, the Dyre banking trojan seemingly disappeared overnight surprising security researchers worldwide. Months later it was announced that Russian authorities had arrested most of the gang responsible for its operations . Prior to that, it was a relatively rare act for Russian authoriti... READ MORE
  3. Tuesday, August 16, 2016
    For several years now, the Vawtrak trojan has been targeting banking and financial institutions, most recently in Canada as reported last week . The Fidelis Threat Research team recently analyzed a new variant to Vawtrak using HTTPS for C2 communications. Given what we've seen previously with Vawtra... READ MORE
  4. Monday, August 1, 2016
    Fidelis Cybersecurity is proud to support the Wall of Sheep (WoS) at Def Con 2016, but this Wall needs to come down . Over the past several years, it's been standing-room only for WoS participants. This year's event promises to be even more spectacular. For those who need background, the 'sheep' on... READ MORE
  5. Monday, August 1, 2016
    Following news reports that the Democratic Congressional Campaign Committee (DCCC) was breached via a spoofed donation website, the ThreatConnect Research team and Fidelis Cybersecurity teamed up to collaborate and take a look at the associated domain to ferret out additional details on the activity... READ MORE
  6. Thursday, July 28, 2016
    We're counting down the last few days to Black Hat USA 2016. As you pack your suitcase and map out your schedule, plan on joining a meetup, seeing a demo or hitting us up for swag at the Fidelis Networking Lounge (aka Booth #1116 ). We can’t promise unicorns and narwhals, but we will have cool t-shi... READ MORE
  7. Tuesday, July 26, 2016
    In politics, getting the dirt on your adversary is nothing new. Candidates and campaigns have been trying to dig up dirt on each other since the dawn of democracy in Athens. More recently, we’ve seen everything from burgling party headquarters, to wiretaps, and campaign stalkers that record every wo... READ MORE
  8. Tuesday, July 19, 2016
    Threat actors provide valuable clues when they compromise a new environment. But a single clue, such as a malware sample, seldom sheds the necessary light on an attack. Sniffing out the tools and tactics of attackers requires that you (or someone you know) has seen them before. Historical attack dat... READ MORE
  9. Wednesday, July 13, 2016
    One of our trusted partners from Poland, Exatel S.A., has discovered that a web browser developed by Maxthon, a company from China, has been collecting sensitive data from its users. The Maxthon browser has anywhere from .75-1% of the global browser market, and has been estimated to be 2-3% of China... READ MORE