1. Deconstructing TinyLoader

    Researchers have observed TinyLoader, a well-known backdoor, delivering point-of-sale and banking trojan malware over the past few years. Fidelis Cybersecurity Threat Research happened to notice it delivered from a site that hosted a variety of other malware and that was an association we had not … READ MORE

  2. Fidelis Threat Update: Petya Ransomware Event, June 27, 2017

    UPDATE: 2:00 pm EDT,June 28, 2017:During subsequent research, the initial infection vector isn't believed to involve Word/RTF files or the CVE-2017-0199 exploit.Further research has also revealed that there is a separate propagation vector involving SMB transfers and execution usingpsexec. Fidel … READ MORE

  3. Elections, Deceptions & Political Breaches

    Political hacks have many lessons for the business world. Political cyberattacks have taken many different forms over recent months, starting from theDemocratic National Committee (DNC) hack, which appears to have been the work of Russian nation-state hackers to cause disruption and controversy … READ MORE

  4. Hello London: Fidelis Cybersecurity to Preview Advanced Malware Detection at Infosecurity Europe

    Are you heading to Infosecurity Europe in Olympia, London on 6-8 June.? We are. In fact, Fidelis Cybersecurity will be showcasing advanced security technology to stop modern intrusions, solve alert fatigue and cut the time to detect, validate and resolve alerts from days to minutes. We welcomeCS … READ MORE

  5. Network Visibility in Cybersecurity

    See It to Secure It: 7 Reasons Why Deep Visibility is Vital for Detecting Modern Threats

    Hacking, theft and compromise often rely on stealth. Exploits can masquerade as part of legitimate-looking emails. Innocuous attachments can contain malicious code. Systems may remain unpatched or still have back doors that become entry points for stealthy intrusions. All of these factors make d … READ MORE

  6. WannaCry

    WannaCry Hits 150+ Nations Worldwide

    Early on Friday, May 12, reports began circulating about WannaCry ransomware outbreaks in the United Kingdom affecting numerous sites at the National Health Service (NHS). Soon after, it became apparent that the impact was global, affecting a large number of victims across Europe, Middle East and … READ MORE

  7. Blackmoon malware framework blog

    Blackmoon Rising: Banking Trojan Back with New Framework

    Banking trojans – true to their name – typically steal web credentials from users of financial services websites. Targeted services can include banks, wealth management firms, investment banks, retirement investment services companies and others – essentially any website where money can be … READ MORE

  8. Detecting Threats with “Whole-Brain” Cybersecurity Technology

    From the CTO’s Desk: Detecting Threats with “Whole-Brain” Technology

    I’ve been designing and programming computer systems for a long time (longer than I’m willing to admit in a public blog post). On many occasions throughout my career I’ve come across problems that were proving to be very difficult (if not impossible) to solve using pure combinatorial logic … READ MORE

  9. Reducing Detection from Months to Minutes: Detecting Credentials in the Clear

    Welcome back to our blog series on reducing detection time from months to minutes. In our first and second posts, we showed how you can use metadata to quickly resolve phishing attacks and investigate threats retroactively. While those two scenarios are pretty common, here’s one that may be new … READ MORE