Understanding the SmokeLoader Downloader
Downloaders and droppers (aka malware that delivers other malware) have been forced to live in the shadow of more famous stages of the exploit kit chain, like landing pages or the malware that's...
View ArticleModern Messaging OPSEC: Popular App Gives Scammers a Boost
Modern messaging apps, many of which offer end-to-end encryption, are used every day by millions of people. These apps come with the expectation of privacy. However, we recently observed an...
View Article5 Requirements for Stopping Modern Intrusions
There’s a reason why airport security x-rays your bags. It’s because the only way you can tell if something is a true threat is to actually look at the contents.It’s the same with network security....
View ArticleWIDESPREAD EXPLOITATION ATTEMPTS USING CVE-2017-5638
Many research teams have reported on their observations of exploits involving the use of the Apache Struts vulnerability CVE-2017-5638 since Cisco Talos published their post on Wednesday March 8....
View ArticlePhind the Phish - Reducing Phishing Detection from Months to Minutes
Every day, attackers tunnel under, sneak through, go around, go over and squeeze past your security technologies.While you’re armed with more security tools than you can count, most of them are hiding...
View ArticleUsing Yara for Intrusion Prevention
Nviso Labs recently published a fascinating blog post illustrating the use of the Lua programming language over the Suricata DPI engine to detect obfuscations in PDF files. Deep analysis of content...
View ArticleCISO, Welcome to the Boardroom: New Regulations Likely to Impact CISO Role
Interesting changes are happening in the world of cybersecurity legislation. Notably, these changes are impacting the role of the chief information security officer (CISO). No longer are CISOs just...
View ArticleGoing Back in Time: Investigating Threats Retroactively
Welcome back to reducing detection time from months to minutes. In the first post in this series, we showed how metadata holds the power to quickly disarm one of the most effective cyberattack methods...
View ArticleOperation TradeSecret: Cyber Espionage at the Heart of Global Trade
In late February, Fidelis Cybersecurity observed a strategic web compromise on a prominent U.S. lobbying group that served up malware to a very specific set of targets. The malware we observed has...
View ArticleReducing Detection from Months to Minutes: Detecting Credentials in the Clear
Welcome back to our blog series on reducing detection time from months to minutes. In our first and second posts, we showed how you can use metadata to quickly resolve phishing attacks and investigate...
View Article