Home | Latest News | Popular News | Our Network | About | Contact
Security News from 'FireEye Research' | www.SecurityPhresh.com
Security News from 'FireEye Research'
Showing 'Security News from 'FireEye Research'' from 91 to 100
The Service You Can’t Refuse: A Secluded HijackRAT
17th Jan 2018 [4 months ago] from FireEye Research
In Android world, sometimes you can’t stop malware from “serving”you, especially when the “service” is actually a malicious Androidclass running in the background and controlled by a remote access tool(RAT). Recently, FireEye...
Darwin’s Favorite APT Group
17th Jan 2018 [4 months ago] from FireEye Research
IntroductionThe attackers referred to as APT12 (also known as IXESHE, DynCalc,and DNSCALC) recently started a new campaign targeting organizationsin Japan and Taiwan. APT12 is believed to be a cyber espionage groupthought to have links...
Microsoft Office Vulnerabilities Used To Distribute Zyklon Malware In Recent Campaign
17th Jan 2018 [4 months ago] from FireEye Research
IntroductionFireEye researchers recently observed threat actors leveragingrelatively new vulnerabilities in Microsoft Office to spread ZyklonHTTP malware. Zyklon has been observed in the wild since early 2016and provides myriad sophisticated...
FLARE IDA Pro Script Series: Simplifying Graphs In IDA
11th Jan 2018 [4 months ago] from FireEye Research
IntroductionWe’re proud to release a new plug-in for IDA Pro users –SimplifyGraph – to help automate creation of groups of nodes in theIDA’s disassembly graph view. Code and binaries are available from theFireEye GitHubrepo. Prior...
Debugging Complex Malware That Executes Code On The Heap
9th Jan 2018 [4 months ago] from FireEye Research
IntroductionIn this blog, I will share a simple debugging tactic for creating“save points” during iterative remote debugging of complex multi-stagesamples that execute code in heap memory at non-deterministicaddresses. I’ll share...
Announcing The FLARE Team And The FLARE On Challenge
8th Jan 2018 [4 months ago] from FireEye Research
I would like to announce the formation of the FireEye Labs AdvancedReverse Engineering (FLARE) team. As part of FireEye Labs, the focusof this team is to support all of FireEye and Mandiant from a reverseengineering standpoint. Many FireEye...
FLARE IDA Pro Script Series: Automatic Recovery Of Constructed Strings In Malware
8th Jan 2018 [4 months ago] from FireEye Research
The FireEye Labs Advanced Reverse Engineering (FLARE) Team isdedicated to sharing knowledge and tools with the community. Westarted with the release of the FLARE On Challenge in early July where thousandsof reverse engineers and security...
FLARE IDA Pro Script Series: MSDN Annotations IDA Pro For Malware Analysis
8th Jan 2018 [4 months ago] from FireEye Research
The FireEye Labs Advanced Reverse Engineering (FLARE) Team continuesto share knowledge and tools with the community. We started this blogseries with a script for AutomaticRecovery of Constructed Strings in Malware. As always, you candownload...
APT28: A Window Into Russias Cyber Espionage Operations?
8th Jan 2018 [4 months ago] from FireEye Research
The role of nation-state actors in cyber attacks was perhaps mostwidely revealed in February 2013 when Mandiant released the APT1 report,which detailed a professional cyber espionage group based in China.Today we release a new report: APT28:...
Double-edged Sword: Australia Economic Partnerships Under Attack From China
8th Jan 2018 [4 months ago] from FireEye Research
During a visit in mid-September, China’s Foreign Minister Wang Yiurged Australia to become “a bridge between east and west.” He wasDown Under to discuss progress on the freetrade agreement between Australia and China that seems likely...
« Newer 3 4 5 6 7 8 9 10 11 12 Older »