Mar 2017

  1. Going Back in Time: Investigating Threats Retroactively

    Thursday, March 30, 2017
      Welcome back to reducing detection time from months to minutes. In the first post in this series, we showed how metadata holds the power to quickly disarm one of the most effective cyberattack methods in the attackers’ arsenal – phishing.  But what about detecting threats in the past? You’ve... READ MORE
  2. CISO, Welcome to the Boardroom: New Regulations Likely to Impact CISO Role

    Tuesday, March 28, 2017
      Interesting changes are happening in the world of cybersecurity legislation. Notably, these changes are impacting the role of the chief information security officer (CISO). No longer are CISOs just the sacrificial lamb (read: scapegoat) when a company suffers a data breach.  The changes revolve... READ MORE
  3. Using Yara for Intrusion Prevention

    Friday, March 24, 2017
      Nviso Labs recently published a fascinating blog post illustrating the use of the Lua programming language over the Suricata DPI engine to detect obfuscations in PDF files. Deep analysis of content seen on networks is a topic close to our heart at Fidelis Cybersecurity. After reading that post,... READ MORE
  4. Phind the Phish - Reducing Phishing Detection from Months to Minutes

    Wednesday, March 15, 2017
      Every day, attackers tunnel under, sneak through, go around, go over and squeeze past your security technologies. While you’re armed with more security tools than you can count, most of them are hiding a dirty little secret: They actually create more work for people, not less. Security teams are... READ MORE
  5. Widespread Exploitation Attempts Using CVE-2017-5638

    Saturday, March 11, 2017
      Many research teams have reported on their observations of exploits involving the use of the Apache Struts vulnerability CVE-2017-5638 since Cisco Talos published their post on Wednesday March 8. Fidelis Cybersecurity Threat Research is also seeing widespread activity and contrary to some... READ MORE
  6. Modern Messaging OPSEC: Popular App Gives Scammers a Boost

    Thursday, March 2, 2017
      Modern messaging apps, many of which offer end-to-end encryption, are used every day by millions of people. These apps come with the expectation of privacy. However, we recently observed an interesting operational security issue involving one such popular messaging app, Telegram. We're posting... READ MORE