Political hacks have many lessons for the business world.
Political cyberattacks have taken many different forms over recent months,
starting from theDemocratic National Committee (DNC) hack, which appears to
have been the work of Russian nation-state hackers to cause disruption and
Are you heading to Infosecurity Europe in Olympia, London on 6-8 June.? We
are. In fact, Fidelis Cybersecurity will be showcasing advanced security
technology to stop modern intrusions, solve alert fatigue and cut the time to
detect, validate and resolve alerts from days to minutes.
We welcomeCS …
Hacking, theft and compromise often rely on stealth. Exploits can masquerade
as part of legitimate-looking emails. Innocuous attachments can contain
malicious code. Systems may remain unpatched or still have back doors that
become entry points for stealthy intrusions.
All of these factors make d …
Early on Friday, May 12, reports began circulating about WannaCry ransomware
outbreaks in the United Kingdom affecting numerous sites at the National
Health Service (NHS). Soon after, it became apparent that the impact was
global, affecting a large number of victims across Europe, Middle East and …
Banking trojans – true to their name – typically steal web credentials
from users of financial services websites. Targeted services can include
banks, wealth management firms, investment banks, retirement investment
services companies and others – essentially any website where money can be …
I’ve been designing and programming computer systems for a long time
(longer than I’m willing to admit in a public blog post).
On many occasions throughout my career I’ve come across problems that were
proving to be very difficult (if not impossible) to solve using pure
combinatorial logic …
Welcome back to our blog series on reducing detection time from months to
minutes. In our first and second posts, we showed how you can use metadata to
quickly resolve phishing attacks and investigate threats retroactively. While
those two scenarios are pretty common, here’s one that may be new …
In late February, Fidelis Cybersecurity observed a strategic web compromise
on a prominent U.S. lobbying groupthat served up malware to a very specific
set of targets. The malware we observed has been used exclusively by Chinese
nation-state threat actors in our observation and according to previ …
Welcome back to reducing detection time from months to minutes. In the
first post in this series, we showed how metadata holds the power to quickly
disarm one of the most effective cyberattack methods in the attackers’
arsenal – phishing. But what about detecting threats in the past?