Home | Latest News | Popular News | Our Network | About | Contact
Security News from 'FireEye Research' | www.SecurityPhresh.com
Security News from 'FireEye Research'
Showing 'Security News from 'FireEye Research'' from 11 to 20
Reverse Engineering The Analyst: Building Machine Learning Models For The SOC
5th Jun 2018 [3 months ago] from FireEye Research
Many cyber incidents can be traced back to an original alert that waseither missed or ignored by the Security Operations Center (SOC) orIncident Response (IR) team. While most analysts and SOCs are vigilantand responsive, the fact is they...
Remote Authentication GeoFeasibility Tool - GeoLogonalyzer
29th May 2018 [3 months ago] from FireEye Research
Users have long needed to access important resources such as virtualprivate networks (VPNs), web applications, and mail servers fromanywhere in the world at any time. While the ability to accessresources from anywhere is imperative for...
Shining A Light On OAuth Abuse With PwnAuth
21st May 2018 [3 months ago] from FireEye Research
IntroductionSpear phishing attacks are seen as one of the biggest cyber threatsto an organization. It only takes one employee to enter theircredentials or run some malware for an entire organization to becomecompromised. As such, companies...
A Deep Dive Into RIG Exploit Kit Delivering Grobios Trojan
14th May 2018 [3 months ago] from FireEye Research
As discussed in previousblogs, exploit kit activity has been on the decline since thelatter half of 2016. However, we do still periodically observesignificant developments in this space, and we have been observinginteresting ongoing activity...
Behind The CARBANAK Backdoor
11th May 2018 [3 months ago] from FireEye Research
In this blog, we will take a closer look at the powerful, versatilebackdoor known as CARBANAK (aka Anunak). Specifically, we willfocus on the operational details of its use over the past few years,including its configuration, the minor...
Rooting A Logitech Harmony Hub: Improving Security In Todays IoT World
3rd May 2018 [4 months ago] from FireEye Research
IntroductionFireEye’s Mandiant Red Team recently discovered vulnerabilitiespresent on the Logitech Harmony Hub Internet of Things (IoT) devicethat could potentially be exploited, resulting in root access to thedevice via SSH. The Harmony...
FLARE VM: The Windows Malware Analysis Distribution You’ve Always Needed!
26th Apr 2018 [4 months ago] from FireEye Research
UPDATE (April 26, 2018): The web installer method to deploy FLAREVM is now deprecated. Please refer to the READMEon the FLARE VM GitHub for the most up-to-date installation instructions.As a reverse engineer on the FLARE Team I rely on...
Analyzing The Malware Analysts – Inside FireEye’s FLARE Team
26th Apr 2018 [4 months ago] from FireEye Research
At the Black Hat USA 2016 conference in Las Vegaslast week, I was fortunate to sit down with Michael Sikorski,Director, FireEye Labs Advanced Reverse Engineering (FLARE) Team.During our conversation we discussed the origin of the FLARE...
Establishing A Baseline For Remote Desktop Protocol
26th Apr 2018 [4 months ago] from FireEye Research
For IT staff and Windows power users, Microsoft Terminal ServicesRemote Desktop Protocol (RDP) is a beneficial tool that allows for theinteractive use or administration of a remote Windows system.However, Mandiant consultants have also...
Metamorfo Campaigns Targeting Brazilian Users
24th Apr 2018 [4 months ago] from FireEye Research
FireEye Labs recently identified several widespread malspam (malwarespam) campaigns targeting Brazilian companies with the goal ofdelivering variants of a banking Trojan that we identify as Metamorfo.Across the stages of these campaigns,...
« Newer 1 2 3 4 5 6 7 8 9 10 Older »