1. Hacker

    SKIDDIEs and PROs vs. Advanced Deception

    Yishai Gerstle |

    There are different types of hackers, each with their own characteristics, methods and goals. We can divide them into white hat & black hat categories, we can group them by their skills or by their goals. There are Pentesters, hackers for hire, hacktivists and espionage groups. Some hackers atta … READ MORE

  2. Insider Threats Seeking Privileged Access

    Insider Threats Seeking Privileged Access

    Tom Clare |

    Insider threats are often defined to include external attacks (i.e. phishing) compromising credentials for access to desired resources and data. While true insider only incidents account for less than 10%, adding in external attacks increases the incident percentage beyond 60% with some claims as … READ MORE

  3. Low Risk Deception Deployments

    Tom Clare |

    The topic of deception often brings up controversial thoughts and some misconceptions. Add in reporters looking for the negative or dark side of an interview for a story about deception, and fear keeps building up. Headlines about deception defenses striking back at attackers, engaging and confu … READ MORE

  4. Deep session inspection visibility issues

    Can Deep Session Inspection® overcome visibility issues of Deep Packet Inspection?

    Kaustubh Jagtap |

    In theprevious blog, we talked about Deep Packet Inspection (DPI), its capabilities, and its limitations. One key limitation is the inability to inspect content hidden deep inside the packet. We alsotalked aboutDeep Session Inspection (DSI), a technologydesigned andpatented specifically to overc … READ MORE

  5. Deep Packet Inspection

    Deep Packet Inspection – Is It Enough?

    Kaustubh Jagtap |

    Security analysts oftentimes feel that Deep Packet Inspection (DPI) is a fundamental requirement for detecting malware and tracking network data loss. This tried and tested method has been around since the early 2000s and it absolutely does have merit, but is it sufficient by itself to prevent in … READ MORE

  6. Gain Enterprise attack visibility using deception

    Using Deception to Gain Enterprise IoT Attack Visibility

    Sam Erdheim |

    The main lessons from attacks against Internet of Things (IoT) devices are to change default usernames and passwords, use longer passphrases to avoid brute force attacks, and make sure devices have enough memory for firmware and kernel updates to remove vulnerabilities or service backdoors, plus … READ MORE

  7. GitHub- Danger in Plain Sight

    GitHub - A Cyber Danger in Plain Sight

    Yishai Gerstle |

    While researching lateral propagation password use in our Deception module, Fidelis Cybersecurity found a surprising number of passwords publicly available. We continued to investigate by pivoting on what we found and uncovered vast caches of passwords. These password lists are publicly availabl … READ MORE

  8. Technical Updates on Gozi V3

    Gozi V3 Technical Update

    Jason Reaves |

    In 2017 Gozi was updated[1] to include protections of the onboard configuration known as INI PARAMS[3]. That update was likely in response to an excellent article written by @maciekkotowicz[2], or possibly because infection rates had dropped due to increased coverage through various IOC extracti … READ MORE

  9. Deception Deployment Strategies

    Deception Deployment Strategies: Containment versus Detection 

    Tom Clare |

    Deception discussions oftenleadto honeypots and then some level of confusion begins. Add in an array of acronyms for deception including: breadcrumbs, decoys, traps, beacons, canaries and tarpits– andmost people new to the topic see anothersecurity research project.Deception technologieswithin … READ MORE