1. How Security Metrics Deliver Business Value & Compliance

    Metrics are tangible values that quantify progress towards a goal. An analytic system combines metrics from numerous sources to assist CISOs and their peers to understand trends and patterns. Metrics play a key role in a larger analytics system. As integral as cybersecurity is to business operat … READ MORE

  2. Emotet Evolution: The Spreader Gets Integrated

    Emotet Evolution: The Spreader Gets Integrated

    Introduction On July 19, 2017 we wrote about the incorporation of a spreader component into the popular Emotet downloader. Just a short while later, a volume spam campaign was initiated that delivered Emotet with further modifications from the samples that we had analyzed. This post documents th … READ MORE

  3. Decrease well time

    The biggest challenge to reduce dwell-time might surprise you

    This is part of a Black Hatinterview with Hardik Modi, Vice President Threat Intelligence thatoriginally ran on https://www.blackhat.com/sponsor-interview/05262017.html#fidelis Question: Organizations are under increasing pressure to improve incident detection and to reduce dwell-times. What are … READ MORE

  4. When to Decrypt

    When to Decrypt and What to Decrypt For Cyber Security

    This is part of a Black Hatinterview with Hardik Modi, Vice President Threat Intelligence thatoriginally ran on https://www.blackhat.com/sponsor-interview/05262017.html#fidelis Question: There's been a push to encrypt everything on the Internet in recent years. How are threat actors exploiting t … READ MORE

  5. Emotet takes wing with a spreader

    Emotet takes wing with a spreader

    Introduction: The recent Wannacry and Petya outbreaks have demonstrated the potency of ransomware coupled with a propagation component (spreader). While typical ransomware infections lead to the denial of access of data on a single victim system, it becomes an enterprise threat when it can propa … READ MORE

  6. From Detection to Remediation: A Case Study with RIG

    From Detection to Remediation: A Case Study with RIG

    Recently, our partner Exatel published its latest research project outlining its investigation following an alert from Fidelis Network, which identified a RIG exploit kit traffic traversing a network. This isn’t interesting, per se, as exploit kit traffic is common in most environments. What ma … READ MORE

  7. Fidelis At Black Hat 2017

    Fidelis at Black Hat 2017: See you in Vegas!

    We're gearing up for Black Hat USA 2017. As you pack your bags and plan ahead, be sure to check out Fidelis – we’ve got demos, advanced technology and smart people. We’re also your stop for cool swag (hint hint!). Oh yeah, and we have pinball. Here’s a look ahead at what we’ll be up to … READ MORE

  8. Deconstructing TinyLoader

    Researchers have observed TinyLoader, a well-known backdoor, delivering point-of-sale and banking trojan malware over the past few years. Fidelis Cybersecurity Threat Research happened to notice it delivered from a site that hosted a variety of other malware and that was an association we had not … READ MORE

  9. Fidelis Threat Update: Petya Ransomware Event, June 27, 2017

    UPDATE: 2:00 pm EDT,June 28, 2017:During subsequent research, the initial infection vector isn't believed to involve Word/RTF files or the CVE-2017-0199 exploit.Further research has also revealed that there is a separate propagation vector involving SMB transfers and execution usingpsexec. Fidel … READ MORE