Modern messaging apps, many of which offer end-to-end encryption, are used
every day by millions of people. These apps come with the expectation of
privacy. However, we recently observed an interesting operational security
issue involving one such popular messaging app, Telegram. We're posting ou …
READ MORE
Downloaders and droppers (aka malware that delivers other malware) have
been forced to live in the shadow of more famous stages of the exploit kit
chain, like landing pages or the malware that's eventually dropped. One
reason they are often overlooked and not analyzed as often is because they
ty …
READ MORE
We're counting down the last few days to RSA 2017. As you pack your suitcase
and map outyour schedule, plan on joining us for a demo atBooth #933.
Stop by and say hello and grab your limited edition t-shirt. Here’s a quick
rundown on where you can find us: RSA 2017 EXPO: Join Fidelis Cybersecur …
READ MORE
Producers of the 1995 James Bond film “GoldenEye” packed the plot with
all the signature elements fans expect from the successful franchise.
Over-the-top supervillain – check. Coolspy gadgets – check. Exotic
locations – check. And, of course, 007 saves the day. The film was also
slight …
READ MORE
What does 2017 hold for security professionals and the industry as a whole?
To answer this question, let’s take a quick look at what has not changed.
For one, ransomware continues to be an effective extortion tool for
attackers. They’re constantly honing their ability to use backdoors and
ro …
READ MORE
Earlier this month, security news media reported attackers holding
internet-exposed MongoDB and Elasticsearch databases for ransom. Attackers
said they’d return the data if they got paid -- otherwise, the data would
be erased. In many reported instances, attackers simply deleted the data.
Unfo …
READ MORE
Security got the boring end of the stick when names for the generations
were handed out. Instead of Millennials, Gen X, Baby Boomers or the Greatest
Generation, we're stuck with "Next Gen." What comes after "Next Gen"? And
where were the creative minds hiding when we needed them most? In this pos …
READ MORE
There are two types of runners: long-distance runners and sprinters.
Everything about them is different. Sprinters are built for power while
marathoners are built for endurance. But what if you could break the mold and
find all of those capabilities in a single athlete? Endpoint detection and
re …
READ MORE
In Part 1 of this series we asked the question: Would you re-hire your IPS
if you interviewed it today? But it’s not a totally fair question. Because,
before you hire someone (or in this case buy something) it’s pretty obvious
that you need a deep and thorough understanding of what the job en …
READ MORE