1. Thursday, May 19, 2016
    The summer travel season is right in front of us. While the jungle may not be your intended destination, that’s exactly where you’re likely to find yourself. When you walk out the door with your smartphone and laptop, you become a high-value target. Your individual privacy and your employer’s valuab... READ MORE
  2. Monday, May 2, 2016
    To follow up on the March report on the discovery of a 64-bit Linux variant of Derusbi used in the Turbo campaign , this post covers our analysis of two unique Windows variants of the Derusbi PGV_PVID malware. Derusbi has been widely covered and associated with numerous Chinese cyber espionage actor... READ MORE
  3. Monday, May 2, 2016
    Here we go again. Stress levels are rising. Colleagues are in a panic and executives want answers now. Critical alerts suggest you’ve been compromised. The question is: Where did it happen? How did the attacker get in? Are any endpoints compromised? What’s the extent of the damage? What was stolen?... READ MORE
  4. Thursday, March 31, 2016
    As criminals continue their relentless ransomware attacks on healthcare providers, organizations are asking how to prepare and minimize the impact of an attack. What can an organization do to bolster their defenses? Prepare! We advise the following strategy to handle a ransomware incident: 1. Assess... READ MORE
  5. Thursday, March 31, 2016
    Ransomware attacks targeting the healthcare community are sending shockwaves through the industry. In late March, Washington DC-based MedStar Health became the latest in a series of providers to fall victim to ransomware. The impact of a network-wide ransomware attack grinds operations to a standsti... READ MORE
  6. Tuesday, March 1, 2016
    In the summer of 2015, Fidelis Cybersecurity had the opportunity to analyze a Derusbi malware sample used as part of a campaign we’ve labeled Turbo, for the associated kernel module that was deployed. Derusbi has been widely covered and associated with Chinese threat actors. This malware has been re... READ MORE
  7. Monday, February 29, 2016
    The adoption of Microsoft Office 365® continues to flourish among businesses of all sizes. The benefits in terms of improved functionality, simplicity, productivity and a reduction in IT expenditures make a compelling case – especially when it comes to managing email communications. Office 365 provi... READ MORE
  8. Wednesday, January 27, 2016
    Security analysts and threat researchers are invited to watch the recorded webinar Dissecting the Malware Involved in the INOCNATION Campaign detailing our investigation of INOCNATION and the new malware variant Hi-Zor. Watch the webinar . In Fidelis Threat Advisory #1020 (FTA), we provided comprehe... READ MORE
  9. Tuesday, January 19, 2016
    This month, a multi-national law enforcement team led by Europol arrested a key player believed to be behind the 2015 distributed denial of service (DDoS) extortion attacks by the criminal gang DD4BC (short for Distributed Denial of Service for Bitcoin). The gang formed in 2014 by targeting online g... READ MORE