1. CISO, Welcome to the Boardroom: New Regulations Likely to Impact CISO Role

    Interesting changes are happening in the world of cybersecurity legislation. Notably, these changes are impacting the role of the chief information security officer (CISO). No longer are CISOs just the sacrificial lamb (read: scapegoat) when a company suffers a data breach. The changes revolve a … READ MORE

  2. Using Yara for Intrusion Prevention

    Nviso Labs recently published a fascinating blog post illustrating the use of the Lua programming language over the Suricata DPI engine to detect obfuscations in PDF files. Deep analysis of content seen on networks is a topic close to our heart at Fidelis Cybersecurity. After reading that post, … READ MORE

  3. Phind the Phish - Reducing Phishing Detection from Months to Minutes

    Every day, attackers tunnel under, sneak through, go around, go over and squeeze past your security technologies. While you’re armed with more security tools than you can count, most of them are hiding a dirty little secret: They actually create more work for people, not less. Security teams a … READ MORE

  4. Widespread Exploitation Attempts Using CVE-2017-5638

    Many research teams have reported on their observations of exploits involving the use of the Apache Struts vulnerability CVE-2017-5638 since Cisco Talos published their post on Wednesday March 8. Fidelis Cybersecurity Threat Research is also seeing widespread activity and contrary to some report … READ MORE

  5. Modern Messaging OPSEC: Popular App Gives Scammers a Boost

    Modern messaging apps, many of which offer end-to-end encryption, are used every day by millions of people. These apps come with the expectation of privacy. However, we recently observed an interesting operational security issue involving one such popular messaging app, Telegram. We're posting ou … READ MORE

  6. Understanding the SmokeLoader Downloader

    Downloaders and droppers (aka malware that delivers other malware) have been forced to live in the shadow of more famous stages of the exploit kit chain, like landing pages or the malware that's eventually dropped. One reason they are often overlooked and not analyzed as often is because they ty … READ MORE

  7. RSA 2017: Join Fidelis Cybersecurity in San Francisco

    We're counting down the last few days to RSA 2017. As you pack your suitcase and map outyour schedule, plan on joining us for a demo atBooth #933. Stop by and say hello and grab your limited edition t-shirt. Here’s a quick rundown on where you can find us: RSA 2017 EXPO: Join Fidelis Cybersecur … READ MORE

  8. Spying on GoldenEye Ransomware

    Producers of the 1995 James Bond film “GoldenEye” packed the plot with all the signature elements fans expect from the successful franchise. Over-the-top supervillain – check. Coolspy gadgets – check. Exotic locations – check. And, of course, 007 saves the day. The film was also slight … READ MORE

  9. Five Security Trends to Watch in 2017

    What does 2017 hold for security professionals and the industry as a whole? To answer this question, let’s take a quick look at what has not changed. For one, ransomware continues to be an effective extortion tool for attackers. They’re constantly honing their ability to use backdoors and ro … READ MORE