1. Detecting Threats with “Whole-Brain” Cybersecurity Technology
    Tuesday, April 25, 2017
    I’ve been designing and programming computer systems for a long time (longer than I’m willing to admit in a public blog post). On many occasions throughout my career I’ve come across problems that were proving to be very difficult (if not impossible) to solve using pure combinatorial logic – meaning... READ MORE
  2. Thursday, April 20, 2017
    Welcome back to our blog series on reducing detection time from months to minutes. In our first and second posts, we showed how you can use metadata to quickly resolve phishing attacks and investigate threats retroactively. While those two scenarios are pretty common, here’s one that may be new to y... READ MORE
  3. Wednesday, April 5, 2017
    In late February, Fidelis Cybersecurity observed a strategic web compromise on a prominent U.S. lobbying group that served up malware to a very specific set of targets. The malware we observed has been used exclusively by Chinese nation-state threat actors in our observation and according to previou... READ MORE
  4. Thursday, March 30, 2017
    Welcome back to reducing detection time from months to minutes. In the first post in this series, we showed how metadata holds the power to quickly disarm one of the most effective cyberattack methods in the attackers’ arsenal – phishing . But what about detecting threats in the past? You’ve read th... READ MORE
  5. Tuesday, March 28, 2017
    Interesting changes are happening in the world of cybersecurity legislation. Notably, these changes are impacting the role of the chief information security officer (CISO). No longer are CISOs just the sacrificial lamb (read: scapegoat) when a company suffers a data breach. The changes revolve aroun... READ MORE
  6. Friday, March 24, 2017
    Nviso Labs recently published a fascinating blog post illustrating the use of the Lua programming language over the Suricata DPI engine to detect obfuscations in PDF files. Deep analysis of content seen on networks is a topic close to our heart at Fidelis Cybersecurity. After reading that post, we d... READ MORE
  7. Wednesday, March 15, 2017
    Every day, attackers tunnel under, sneak through, go around, go over and squeeze past your security technologies. While you’re armed with more security tools than you can count, most of them are hiding a dirty little secret: They actually create more work for people, not less. Security teams are inu... READ MORE
  8. Saturday, March 11, 2017
    Many research teams have reported on their observations of exploits involving the use of the Apache Struts vulnerability CVE-2017-5638 since Cisco Talos published their post on Wednesday March 8. Fidelis Cybersecurity Threat Research is also seeing widespread activity and contrary to some reporting... READ MORE
  9. Thursday, March 9, 2017
    There’s a reason why airport security x-rays your bags. It’s because the only way you can tell if something is a true threat is to actually look at the contents. It’s the same with network security. The only way to prevent modern intrusions is to actually inspect the content on your network in real... READ MORE