Apr 2017

  1. Detecting Threats with “Whole-Brain” Cybersecurity Technology

    From the CTO’s Desk: Detecting Threats with “Whole-Brain” Technology

    Tuesday, April 25, 2017
    I’ve been designing and programming computer systems for a long time (longer than I’m willing to admit in a public blog post). On many occasions throughout my career I’ve come across problems that were proving to be very difficult (if not impossible) to solve using pure combinatorial logic –... READ MORE
  2. Reducing Detection from Months to Minutes: Detecting Credentials in the Clear

    Thursday, April 20, 2017
    Welcome back to our blog series on reducing detection time from months to minutes. In our first and second posts, we showed how you can use metadata to quickly resolve phishing attacks and investigate threats retroactively. While those two scenarios are pretty common, here’s one that may be new to... READ MORE
  3. Operation TradeSecret: Cyber Espionage at the Heart of Global Trade

    Wednesday, April 5, 2017
    In late February, Fidelis Cybersecurity observed a strategic web compromise on a prominent U.S. lobbying group that served up malware to a very specific set of targets. The malware we observed has been used exclusively by Chinese nation-state threat actors in our observation and according to... READ MORE