Cyber Scoop: July 10, 2015
This Week in Cybersecurity NewsHacking Team gets Hacked: Invoices Suggest Spyware Sold to Repressive Govts by Dan Goodin, Ars TechnicaItaly- based Hacking Team, which specializes in weaponized spyware...
View ArticleBlack Hat USA 2015: A Look at the Week Ahead
We’re less than a week away from Black Hat USA 2015. Following an exciting few months here at Fidelis Cybersecurity, we’re looking forward to catching up with everyone in Las Vegas and have a week...
View ArticleFidelis Threat Advisory #1018 Overview: Looking at the Sky for a DarkComet
Fidelis Threat Advisory #1018Looking at the Sky for a DarkCometFirst created in 2008, DarkComet is an efficient function-rich remote access tool (RAT) that has been leveraged against various targets....
View ArticleDarkComet Thrives, Not So Easy to Extinguish
Use of remote access tools (RATs) is a tried and true cyber espionage tool favored by a diverse group of threat actors. They have been used to enable many of the recent, high profile breaches including...
View ArticleGood Malware Never Dies: AlienSpy Reborn as JSocket
News of the murder of Argentinian prosecutor Alberto Nisman linked to an unique version of AlienSpy takes another turn. Last week we began tracking organizations in the U.S., UK and Germany that were...
View ArticleCombined Network and Endpoint Visibility Vital to Combating Advanced Threats
Security teams are continuously challenged in monitoring and securing network infrastructures, connected endpoints, and appliances in order to protect complex and technologically evolving corporate...
View ArticleAll Threat Intelligence Feeds Are Not Equal
It seems you can’t throw a rock without hitting a new security startup that creates, consumes, manages or integrates threat intelligence. The term “threat intelligence” is one of the least agreed upon...
View ArticleCompromised Networks Mean Compromised Careers - The Ashley Madison Affair...
Today’s breaking news around the dismissal of Ashley Madison’s CEO Noel Biderman comes as no shock following the aftermath of their recent breach. More and more CEOs are taking the blame and suffering...
View ArticleTaming the Tiger: Domestic and foreign policy complexities in curbing China's...
For years China has engaged in a systematic process to extract intellectual property and state secrets from the United States in direct support of their five-year plans.A Brief HistoryGiven the United...
View ArticlePassword Hygiene: Hiding Your Identity is Difficult for Attackers and Adulterers
Let’s say you’re an individual who wants to start engaging in naughty behavior online but the Ashley Madison dump has made you skittish. Engaging in bad behavior (and for that matter crime) is pretty...
View ArticleCyber-Brinkmanship: Xi and Obama’s Non-Summit Trilogy
The irony of this week’s summit meeting between President Obama and China’s President, Xi Jinping, is that these two heads of state may be powerless to stop the silent cyber conflict that they are...
View ArticleWhy healthcare firms are overdue for a cyber cataclysm
Healthcare has remained on the fringes of direct cyber targeting, but the value of health data now places many organizations inline for a cyber catastrophe. Today, a government report found security...
View ArticleWhy are financial services struggling to detect cyber intrusions?
Every major breach targeting financial services organizations involves compromised credentials. Knowing this, one could state that if an organization can ensure that their credentials are not...
View ArticleWorld Leaders Xi and Obama’s Flawed Cybersecurity Agreement
The prevailing opinion, amongst my comrades here at Fidelis Cybersecurity, and other notables in the cyberdefense community is that this agreement is flawed, and only a half measure. This will not...
View ArticleArming the Boardroom Part 1: Empowering Board Directors in their Battle...
Over the past three to five years, organizations have witnessed cyber attacks growing in scope, complexity, and severity. The nature of cyber attacks has evolved from the theft of financial data and...
View ArticleArming the Boardroom, Part 2: Know Your Enemy
My last post introduced Fidelis Cybersecurity’s effort to empower board members in their battle against cyber attacks by offering real-world counsel regarding the management of incident response via a...
View ArticleCyber Crime: Eastern Europe and Russia Continue to Refine Operations
According to recent Interpol findings, cybercrime originating from Russia and Eastern Europe continues to increase, as attackers broaden their capabilities and gain technical sophistication. Recent...
View ArticleEU’s GENERAL DATA PROTECTION REGULATION REGIONAL FRAMEWORK
Driven in part by the onslaught of high-profile data breaches, such as Target, Sony, Anthem and Ashley Madison, the European Union (EU) is reforming its data protection legislation. The “General Data...
View ArticleSenate Passes CISA Procedural Amendments as Privacy Concerns Heat Up
Recently, Apple stated its opposition to a controversial cybersecurity bill in which initial amendments passed today in the Senate. The Cybersecurity Information Sharing Act (CISA) has been marketed as...
View Article