1. Hacker

    SKIDDIEs and PROs vs. Advanced Deception

    Yishai Gerstle Guy Gilat |

    There are different types of hackers, each with their own characteristics, methods and goals. We can divide them into white hat & black hat categories, we can group them by their skills or by their goals. There are Pentesters, hackers for hire, hacktivists and espionage groups. Some hackers atta … READ MORE

  2. Insider Threats Seeking Privileged Access

    Insider Threats Seeking Privileged Access

    Tom Clare |

    Insider threats are often defined to include external attacks (i.e. phishing) compromising credentials for access to desired resources and data. While true insider only incidents account for less than 10%, adding in external attacks increases the incident percentage beyond 60% with some claims as … READ MORE

  3. Low Risk Deception Deployments

    Tom Clare |

    The topic of deception often brings up controversial thoughts and some misconceptions. Add in reporters looking for the negative or dark side of an interview for a story about deception, and fear keeps building up. Headlines about deception defenses striking back at attackers, engaging and confu … READ MORE

  4. Deep session inspection visibility issues

    Can Deep Session Inspection® overcome visibility issues of Deep Packet Inspection?

    Kaustubh Jagtap |

    In theprevious blog, we talked about Deep Packet Inspection (DPI), its capabilities, and its limitations. One key limitation is the inability to inspect content hidden deep inside the packet. We alsotalked aboutDeep Session Inspection (DSI), a technologydesigned andpatented specifically to overc … READ MORE

  5. Deep Packet Inspection

    Deep Packet Inspection – Is It Enough?

    Kaustubh Jagtap |

    Security analysts oftentimes feel that Deep Packet Inspection (DPI) is a fundamental requirement for detecting malware and tracking network data loss. This tried and tested method has been around since the early 2000s and it absolutely does have merit, but is it sufficient by itself to prevent in … READ MORE

  6. GitHub- Danger in Plain Sight

    GitHub - A Cyber Danger in Plain Sight

    Yishai Gerstle |

    While researching lateral propagation password use in our Deception module, Fidelis Cybersecurity found a surprising number of passwords publicly available. We continued to investigate by pivoting on what we found and uncovered vast caches of passwords. These password lists are publicly availabl … READ MORE

  7. Technical Updates on Gozi V3

    Gozi V3 Technical Update

    Jason Reaves |

    In 2017 Gozi was updated[1] to include protections of the onboard configuration known as INI PARAMS[3]. That update was likely in response to an excellent article written by @maciekkotowicz[2], or possibly because infection rates had dropped due to increased coverage through various IOC extracti … READ MORE

  8. Deception Deployment Strategies

    Deception Deployment Strategies: Containment versus Detection 

    Tom Clare |

    Deception discussions oftenleadto honeypots and then some level of confusion begins. Add in an array of acronyms for deception including: breadcrumbs, decoys, traps, beacons, canaries and tarpits– andmost people new to the topic see anothersecurity research project.Deception technologieswithin … READ MORE

  9. Evolving from honeypots to active deception defenses

    From Honeypots to Active Deception Defenses

    Tom Clare |

    A very frequent response when mentioning deception is a reference to honeypots in the realm of cyber security defenses. Yes, modern deception defenses are derived from honeypots and understanding the evolution of this valuable defense is the focus of this blog. The basic concept of honeypots are … READ MORE