Fidelis Cybersecurity is proud to support the Wall of Sheep (WoS) at Def Con
2016, but this Wall needs to come down. Over the past several years, it's
been standing-room only for WoS participants. This year's event promises to
be even more spectacular. For those who need background, the 'sheep' o …
READ MORE
Following news reports that the Democratic Congressional Campaign Committee
(DCCC) was breached via a spoofed donation website, the ThreatConnect
Research team and Fidelis Cybersecurity teamed up to collaborate and take a
look at the associated domain to ferret out additional details on the
acti …
READ MORE
We're counting down the last few days to Black Hat USA 2016. As you pack your
suitcase and map out your schedule, plan on joining a meetup, seeing a demo
or hitting us up for swag at the Fidelis Networking Lounge (aka Booth #1116).
We can’t promise unicorns and narwhals, but we will have cool t …
READ MORE
In politics, getting the dirt on your adversary is nothing new. Candidates
and campaigns have been trying to dig up dirt on each other since the dawn of
democracy in Athens. More recently, we’ve seen everything from burgling
party headquarters, to wiretaps, and campaign stalkers that record eve …
READ MORE
Threat actors provide valuable clues when they compromise a new environment.
But a single clue, such as a malware sample, seldom sheds the necessary light
on an attack. Sniffing out the tools and tactics of attackers requires that
you (or someone you know) has seen them before. Historical attack …
READ MORE
One of our trusted partners from Poland, Exatel S.A., has discovered that a
web browser developed by Maxthon, a company from China, has been collecting
sensitive data from its users. The Maxthon browser has anywhere from .75-1%
of the global browser market, and has been estimated to be 2-3% of Ch …
READ MORE
With season two of Mr. Robot approaching, the storyline follows a hacker
group that takes down an evil global corporation and collapses the financial
market. Led by the mysterious Mr. Robot, the hackers use a variety of tricks
to evade detection, and seem to cover their tracks at every turn. Ther …
READ MORE
We've recently observed a new crypter called Xenon used to deliver Locky, a
strain of ransomware, and Ruckguv, a type of malware that can download and
install other types of malware. Xenon employs a novel trick to bypass
debuggers, which we’ll describe here along with the techniques it uses. We …
READ MORE
Well Britain, you’ve done it. The referendum is over and it's time to start
thinking ahead about how the UK will reconcile its new laws and
regulations. I believe that the UK could be at the beginning of a
cybersecurity Renaissance, and I’ll explain why. At this point, it is
uncertain how lo …
READ MORE