fidelissecurity.com Open in urlscan Pro
2620:12a:8001::4  Public Scan

Submitted URL: http://www.fidelissecurity.com/threatgeek
Effective URL: https://fidelissecurity.com/threatgeek/
Submission: On June 28 via manual from IN — Scanned from DE

Form analysis 2 forms found in the DOM

<form id="mktoForm_1324" novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutLeft">
  <style type="text/css">
    .mktoForm .mktoButtonWrap.mktoInset .mktoButton {
      color: #000;
      background: #fff;
      border: 1px solid #aeb0b6;
      padding: 0.4em 1em;
      font-size: 1em;
      box-shadow: 1px 1px 6px 1px #ccc;
      background-color: #f5f5f5;
      background-image: -webkit-gradient(linear, left top, left bottom, from(#f5f5f5), to(#dfdfdf));
      background-image: -webkit-linear-gradient(top, #f5f5f5, #dfdfdf);
      background-image: -moz-linear-gradient(top, #f5f5f5, #dfdfdf);
      background-image: linear-gradient(to bottom, #f5f5f5, #dfdfdf);
    }

    .mktoForm .mktoButtonWrap.mktoInset .mktoButton:hover {
      border: 1px solid #999;
    }

    .mktoForm .mktoButtonWrap.mktoInset .mktoButton:focus {
      outline: none;
      border: 1px solid #999;
    }

    .mktoForm .mktoButtonWrap.mktoInset .mktoButton:active {
      box-shadow: inset 1px 1px 6px 1px #ccc;
      background-color: #dfdfdf;
      background-image: -webkit-gradient(linear, left top, left bottom, from(#dfdfdf), to(#f5f5f5));
      background-image: -webkit-linear-gradient(top, #dfdfdf, #f5f5f5);
      background-image: -moz-linear-gradient(top, #dfdfdf, #f5f5f5);
      background-image: linear-gradient(to bottom, #dfdfdf, #f5f5f5);
    }
  </style>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 10px;">
      <div class="mktoOffset" style="width: 10px;"></div>
      <div class="mktoFieldWrap mktoRequiredField"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth" style="width: 100px;">
          <div class="mktoAsterix">*</div><span style="color: #ffffff; font-size: 14px; font-family: arial, helvetica, sans-serif;">Email:</span>
        </label>
        <div class="mktoGutter mktoHasWidth" style="width: 10px;"></div><input id="Email" name="Email" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email" class="mktoField mktoEmailField mktoHasWidth mktoRequired"
          aria-required="true" style="width: 300px;" placeholder="Email:"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
        <div class="mktoClear"></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="ListThreatGeek" class="mktoField mktoFieldDescriptor mktoFormCol" value="true" style="margin-bottom: 10px;" placeholder="">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoButtonRow"><span class="mktoButtonWrap mktoInset" style="margin-left: 120px;"><button type="submit" class="">SIGN ME UP</button></span></div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor" value="1324"
    placeholder=""><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="884-ZRZ-648" placeholder="">
</form>

<form novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutLeft"></form>

Text Content

Skip to content
 * Platform
   * Fidelis Elevate
     * Fidelis Elevate
     * Fidelis Network
     * Fidelis Endpoint
     * Fidelis Deception
   * Fidelis Halo
     * Fidelis Halo
     * Cloud Secure
     * Server Secure
     * Container Secure
   * 
 * Use Cases
 * Blogs
 * Partners
 * Resources
 * Company
   * About Us
   * Leadership
   * Press
   * Careers
   * Events
   * Federal Contracts and Certifications
   * Contact
 * Free Trial
   * Fidelis Network
   * Fidelis Halo
 * Schedule Demo
   * Fidelis Elevate
   * Fidelis Halo

 * Fidelis Halo Login
 * Service & Support
 * Contact Us

 * Free Trial
   * Fidelis Network
   * Fidelis Halo
 * Schedule Demo
   * Fidelis Elevate
   * Fidelis Halo

 * Platform
   * Fidelis Elevate
     * Fidelis Elevate
     * Fidelis Network
     * Fidelis Endpoint
     * Fidelis Deception
   * Fidelis Halo
     * Fidelis Halo
     * Cloud Secure
     * Server Secure
     * Container Secure
   * 
 * Use Cases
 * Blogs
 * Partners
 * Resources
 * Company
   * About Us
   * Leadership
   * Press
   * Careers
   * Events
   * Federal Contracts and Certifications
   * Contact
 * Free Trial
   * Fidelis Network
   * Fidelis Halo
 * Schedule Demo
   * Fidelis Elevate
   * Fidelis Halo

X



THREAT GEEK


NEW MOVEIT VULNERABILITY: WHAT TO DO NOW TO PROTECT YOUR ORGANIZATION

Read More



SUBSCRIBE TO THE THREAT GEEK BLOG

The latest news updates, threat research and industry insights from the pros at
Fidelis.

*
Email:





SIGN ME UP


LEARN ABOUT THE LATEST CYBERSECURITY THREATS

The Threat Research team (TRT) at Fidelis Cybersecurity researches and analyzes
the latest threats and issues.

Read The Latest Report from our Threat Research team
Topic
Filter by Topic
Network DLP (0)
Network Detection and Response (0)
Ransomware (0)
Cloud Security (66)
XDR/Active XDR (0)
Network Computing (1)
Deception (41)
Server security (0)
Zero Trust (0)
Alliance (0)
Data Protection (46)
Endpoint Security (39)
Incident Response (8)
Network Security (85)
Threat Detection and Response (121)
Threat Hunting (14)
Threat Intelligence (48)


Search
June 15, 2023


MAY 2023 THREAT INTELLIGENCE SUMMARY

Read More
June 5, 2023


FIDELIS CYBERSECURITY UNLEASHES THE POWER OF FIDELIS CLOUDPASSAGE HALO ACROSS
EUROPE, FUELING UNPRECEDENTED CLOUD SECURITY COVERAGE

Read More
June 2, 2023


HOW TO SPOT AND STOP ACTIVE DIRECTORY ATTACKS FASTER – PART 2

Read More
May 18, 2023


APRIL 2023 THREAT INTELLIGENCE SUMMARY

Read More
May 16, 2023


BEYOND CYBERSECURITY: THE ROLE OF CYBER RESILIENCY IN NETWORK DEFENSE

Read More
May 12, 2023


HOW TO SPOT AND STOP ACTIVE DIRECTORY ATTACKS FASTER

Read More
April 28, 2023


FIDELIS CYBERSECURITY AWARDED GOLD FOR SECURITY INNOVATIONS BY MERIT AWARDS

Read More
April 19, 2023


NEW VARIANTS OF QAKBOT BANKING TROJAN

Read More
1
2
3
4
…
19
Next
✓
Thanks for sharing!
AddToAny
More…



GET STARTED

See Fidelis Cybersecurity platforms in action. Learn how our fast, scalable
Fidelis Elevate and Fidelis CloudPassage Halo platforms provide deep insights
into the SOC to help security teams worldwide protect, detect, respond, and
neutralize even the most advanced cyber adversaries.



FREE TRIAL

FIDELIS NETWORK

FIDELIS HALO

DEMO

FIDELIS ELEVATE

FIDELIS HALO



Shift to proactive cyber defense and more quickly find, stop, and remediate
advanced threats from modern cyber adversaries attacking commercial, enterprise,
and government organizations.


 * Platform
 * Use Cases
 * Blogs
 * Partners
 * Resources
 * Company
 * Education Center

 * Platform
 * Use Cases
 * Blogs
 * Partners
 * Resources
 * Company
 * Education Center

 * Threat Research
 * Apache Log4j Vulnerability
 * Fidelis Halo Login
 * Service & Support
 * Contact Us

 * Threat Research
 * Apache Log4j Vulnerability
 * Fidelis Halo Login
 * Service & Support
 * Contact Us

Facebook Twitter Linkedin Youtube



FIDELIS CYBERSECURITY

 * Privacy
 * Terms of Use
 * Security

 * Privacy
 * Terms of Use
 * Security

FIDELIS CLOUDPASSAGE HALO

 * Privacy
 * Terms of Use
 * Trust Center

 * Privacy
 * Terms of Use
 * Trust Center

© 2002-2023 Fidelis Cybersecurity. All rights reserved.

FacebookTwitterLinkedInShare
YOUR CHOICE REGARDING COOKIES ON THIS SITE
We use cookies to optimize site functionality and give you the best possible
experience. Learn More
Privacy policy I CONSENT


×
We Value Your Privacy
Settings
NextRoll, Inc. ("NextRoll") and our advertising partners use cookies and similar
technologies on this site and use personal data (e.g., your IP address). If you
consent, the cookies, device identifiers, or other information can be stored or
accessed on your device for the purposes described below. You can click "Allow
All" or "Decline All" or click Settings above to customize your consent.
NextRoll and our advertising partners process personal data to: ● Store and/or
access information on a device; ● Create a personalized content profile; ●
Select personalised content; ● Personalized ads, ad measurement and audience
insights; ● Product development. For some of the purposes above, our advertising
partners: ● Use precise geolocation data. Some of our partners rely on their
legitimate business interests to process personal data. View our advertising
partners if you wish to provide or deny consent for specific partners, review
the purposes each partner believes they have a legitimate interest for, and
object to such processing.
If you select Decline All, you will still be able to view content on this site
and you will still receive advertising, but the advertising will not be tailored
for you. You may change your setting whenever you see the Manage consent
preferences on this site.
Decline All
Allow All
Manage consent preferences