1. Low Risk Deception Deployments

    Tom Clare |

    The topic of deception often brings up controversial thoughts and some misconceptions. Add in reporters looking for the negative or dark side of an interview for a story about deception, and fear keeps building up. Headlines about deception defenses striking back at attackers, engaging and confu … READ MORE

  2. Deep session inspection visibility issues

    Can Deep Session Inspection® overcome visibility issues of Deep Packet Inspection?

    Kaustubh Jagtap |

    In theprevious blog, we talked about Deep Packet Inspection (DPI), its capabilities, and its limitations. One key limitation is the inability to inspect content hidden deep inside the packet. We alsotalked aboutDeep Session Inspection (DSI), a technologydesigned andpatented specifically to overc … READ MORE

  3. Deep Packet Inspection

    Deep Packet Inspection – Is It Enough?

    Kaustubh Jagtap |

    Security analysts oftentimes feel that Deep Packet Inspection (DPI) is a fundamental requirement for detecting malware and tracking network data loss. This tried and tested method has been around since the early 2000s and it absolutely does have merit, but is it sufficient by itself to prevent in … READ MORE

  4. Gain Enterprise attack visibility using deception

    Using Deception to Gain Enterprise IoT Attack Visibility

    Sam Erdheim |

    The main lessons from attacks against Internet of Things (IoT) devices are to change default usernames and passwords, use longer passphrases to avoid brute force attacks, and make sure devices have enough memory for firmware and kernel updates to remove vulnerabilities or service backdoors, plus … READ MORE

  5. GitHub- Danger in Plain Sight

    GitHub - A Cyber Danger in Plain Sight

    Yishai Gerstle |

    While researching lateral propagation password use in our Deception module, Fidelis Cybersecurity found a surprising number of passwords publicly available. We continued to investigate by pivoting on what we found and uncovered vast caches of passwords. These password lists are publicly availabl … READ MORE

  6. Technical Updates on Gozi V3

    Gozi V3 Technical Update

    Jason Reaves |

    In 2017 Gozi was updated[1] to include protections of the onboard configuration known as INI PARAMS[3]. That update was likely in response to an excellent article written by @maciekkotowicz[2], or possibly because infection rates had dropped due to increased coverage through various IOC extracti … READ MORE

  7. Deception Deployment Strategies

    Deception Deployment Strategies: Containment versus Detection 

    Tom Clare |

    Deception discussions oftenleadto honeypots and then some level of confusion begins. Add in an array of acronyms for deception including: breadcrumbs, decoys, traps, beacons, canaries and tarpits– andmost people new to the topic see anothersecurity research project.Deception technologieswithin … READ MORE

  8. Evolving from honeypots to active deception defenses

    From Honeypots to Active Deception Defenses

    Tom Clare |

    A very frequent response when mentioning deception is a reference to honeypots in the realm of cyber security defenses. Yes, modern deception defenses are derived from honeypots and understanding the evolution of this valuable defense is the focus of this blog. The basic concept of honeypots are … READ MORE

  9. A review of the current state of the Emotet Spreader

    Emotet Update

    Jason Reaves |

    Last year Fidelis Cybersecurity posted an update to our previous research on the Emotet spreader module(7). Our analysts continue to monitor this threat however, due to ongoing Emotet activity recently, the Fidelis Threat Research Team recently dedicated some time to checking out an updated sampl … READ MORE