1. Fidelis Blog - Exploring X.509 Vulnerabilities and covert data exchanges

    Sometimes what’s missing is right in front of us, we only need to look.

    Jason Reaves Chad Robertson |

    Introduction: Recent research conducted by our threat research team has identified a new method of covert channel data exchange using a well-known and widely implemented public key certificates standard (X.509) utilized in both TLS and SSL cryptographic internet protocol implementations. While c … READ MORE

  2. Fidelis Blog: Using Network and Application Breadcrumbs for Intelligent Deception

    Using Network & Application Breadcrumbs For Intelligent Deception

    Doron Kolton |

    Intelligent deception technology exploits the need of an attacker to discover as much as they can about where they are in the organization’s network immediately post compromise. This is a process not a single event. We have covered active directory and credential breadcrumbs,and file and data … READ MORE

  3. Using File and Data Breadcrumbs for Intelligent Deception

    Using File & Data Breadcrumbs For Intelligent Deception

    Doron Kolton |

    Cyber attacks are not single events, they’re processes. When attackers first access a network or endpoint, they don’t know where they are. So they carefully try to find out as much as possible about the organization. This is precisely the behavior that intelligent deception technology can exp … READ MORE

  4. 4 Kinds of Breadcrumbs In Intelligent Deception

    4 Kinds of Breadcrumbs In Intelligent Deception

    Doron Kolton |

    Cyber attacks are processes that compromise, spread and exploit multiple systems across an organization. They’re not single events. When attackers compromise an asset, they don’t know which asset is infected; they must determine where they are in the network, the network structure and where t … READ MORE

  5. Intelligent Deception Creates Evidence Of Credential & Connection To Lure Attackers To Decoys

    Intelligent Deception Creates Evidence Of Credential & Connection To Lure Attackers To Decoys

    Doron Kolton |

    To attract attackers, decoys are made to resemble the target systems as closely as possible. They have the look and feel of systems that an attacker seeks. Intelligent deception solutions actively lure attackers to the decoys once they have penetrated the perimeter. These lures, or breadcrumbs, e … READ MORE

  6. Fidelis Report: Transformation Of Security Operations Is Top Of Mind for 2018

    New Research Report: Transformation Of Security Operations Is Top Of Mind for 2018

    This report, conducted by SC Media and sponsored Fidelis asked security leaders, decision makers and influencers what they were most concerned about, what their C-Suite was most concerned about, and what they’re doing (or planning to do) about it. As we start off 2018 it is clear that cybersecu … READ MORE

  7. Deception Technology

    Deception Security: Modern Maturity for Automated Detection and Response

    Doron Kolton |

    Deception is becoming a critical part of organisations' security infrastructure. According to Gartner, the need for better detection and response is creating new opportunities for security stack automation, integration, consolidation and orchestration, while also driving the emergence of new seg … READ MORE

  8. Fidelis Blog - SPECTRE & MELTDOWN: WHAT YOU NEED TO KNOW

    Spectre & Meltdown: What You Need to Know

    Update: Fidelis has released a script for Fidelis Endpoint customers that allows users to quickly query their environment to check for the existence of the OS patches in addition to the hardware mitigations and optimizations in relation to Spectre/Meltdown. This allows for quick reporting across … READ MORE

  9. The biggest data breaches of 2017

    2017 The Year Of The Breach

    Cybercrime is a growing threat in today’s hyper-connected age. Breaches grew 15% between 2016 and 2017 (ITRC 2016, ITRC 2017). Meanwhile he average cost of a data breach blossomed to over $7 million according to a new Ponemon study and cybercrime damages are slated to cost the world $6 trillion … READ MORE