This is part of a Black Hatinterview with Hardik Modi, Vice President
Threat Intelligence thatoriginally ran on
https://www.blackhat.com/sponsor-interview/05262017.html#fidelis
Question: There's been a push to encrypt everything on the Internet in recent
years. How are threat actors exploiting t …
READ MORE
Introduction:
The recent Wannacry and Petya outbreaks have demonstrated the potency of
ransomware coupled with a propagation component (spreader). While typical
ransomware infections lead to the denial of access of data on a single victim
system, it becomes an enterprise threat when it can propa …
READ MORE
Recently, our partner Exatel published its latest research project outlining
its investigation following an alert from Fidelis Network, which identified
a RIG exploit kit traffic traversing a network. This isn’t interesting, per
se, as exploit kit traffic is common in most environments. What ma …
READ MORE
We're gearing up for Black Hat USA 2017. As you pack your bags and plan
ahead, be sure to check out Fidelis – we’ve got demos, advanced
technology and smart people. We’re also your stop for cool swag (hint
hint!). Oh yeah, and we have pinball.
Here’s a look ahead at what we’ll be up to …
READ MORE
Researchers have observed TinyLoader, a well-known backdoor, delivering
point-of-sale and banking trojan malware over the past few years. Fidelis
Cybersecurity Threat Research happened to notice it delivered from a site
that hosted a variety of other malware and that was an association we had not …
READ MORE
UPDATE: 2:00 pm EDT,June 28, 2017:During subsequent research, the initial
infection vector isn't believed to involve Word/RTF files or the
CVE-2017-0199 exploit.Further research has also revealed that there is a
separate propagation vector involving SMB transfers and execution
usingpsexec. Fidel …
READ MORE
Political hacks have many lessons for the business world.
Political cyberattacks have taken many different forms over recent months,
starting from theDemocratic National Committee (DNC) hack, which appears to
have been the work of Russian nation-state hackers to cause disruption and
controversy …
READ MORE
Are you heading to Infosecurity Europe in Olympia, London on 6-8 June.? We
are. In fact, Fidelis Cybersecurity will be showcasing advanced security
technology to stop modern intrusions, solve alert fatigue and cut the time to
detect, validate and resolve alerts from days to minutes.
We welcomeCS …
READ MORE
Hacking, theft and compromise often rely on stealth. Exploits can masquerade
as part of legitimate-looking emails. Innocuous attachments can contain
malicious code. Systems may remain unpatched or still have back doors that
become entry points for stealthy intrusions.
All of these factors make d …
READ MORE