Home | Latest News | Popular News | Our Network | About | Contact
Security News from 'FireEye Research' | www.SecurityPhresh.com
Security News from 'FireEye Research'
Showing 'Security News from 'FireEye Research'' from 21 to 30
Loading Kernel Shellcode
23rd Apr 2018 [4 months ago] from FireEye Research
In the wake of recent hacking tool dumps, the FLARE team saw a spikein malware samples detonating kernel shellcode. Although most samplescan be analyzed statically, the FLARE team sometimes debugs thesesamples to confirm specific functionality....
M-Trends Asia Pacific: Organizations Must Improve At Detecting And Responding To Breaches
19th Apr 2018 [4 months ago] from FireEye Research
Since 2010, Mandiant, a FireEye company, has presented trends,statistics and case studies of some of the largest and mostsophisticated cyber attacks. In February 2016, we released our annualglobal M-Trends®report based on data from the...
FIN7 Evolution And The Phishing LNK
19th Apr 2018 [4 months ago] from FireEye Research
FIN7 is a financially-motivated threat group that has been associatedwith malicious operations dating back to late 2015. FIN7 is referredto by many vendors as “Carbanak Group”, although we do not equate allusage of the CARBANAK backdoor...
M-Trends 2017: A View From The Front Lines
19th Apr 2018 [4 months ago] from FireEye Research
Every year Mandiant responds to a large number ofcyber attacks, and 2016 was no exception. For our M-Trends 2017 report, we took a look atthe incidents we investigated last year and provided a global andregional (the Americas, APAC and...
How The Rise Of Cryptocurrencies Is Shaping The Cyber Crime Landscape: Blockchain Infrastructure Use
17th Apr 2018 [4 months ago] from FireEye Research
IntroductionCyber criminals have always been attracted to cryptocurrenciesbecause it provides a certain level of anonymity and can be easilymonetized. This interest has increased in recent years, stemming farbeyond the desire to simply...
Solving Ad-hoc Problems With Hex-Rays API
10th Apr 2018 [4 months ago] from FireEye Research
IntroductionIDA Pro is the defacto standard when it comes to binary reverse engineering. Besidesbeing a great disassembler and debugger, it is possible to extend itand include a powerful decompiler by purchasing an additional licensefrom...
Fake Software Update Abuses NetSupport Remote Access Tool
5th Apr 2018 [5 months ago] from FireEye Research
Over the last few months, FireEye has tracked an in-the-wild campaignthat leverages compromised sites to spread fake updates. In somecases, the payload was the NetSupport Manager remote access tool(RAT). NetSupport Manager is a commercially...
Introducing Monitor.app For MacOS
4th Apr 2018 [5 months ago] from FireEye Research
UPDATE (April 4, 2018): Monitor.app now supports macOS 10.13.As a malware analyst or systems programmer, having a suite of soliddynamic analysis tools is vital to being quick and effective. Thesetools enable us to understand malware capabilities...
M-Trends 2018
4th Apr 2018 [5 months ago] from FireEye Research
What have incident responders observed and learned from cyber attacksin 2017? Just as in prior years, we have continued to see the cybersecurity threat landscape evolve. Over the past twelve months we haveobserved a number of new trends...
Cerber: Analyzing A Ransomware Attack Methodology To Enable Protection
3rd Apr 2018 [5 months ago] from FireEye Research
Ransomware is a common method of cyber extortion for financial gainthat typically involves users being unable to interact with theirfiles, applications or systems until a ransom is paid. Accessibilityof cryptocurrency such as Bitcoin has...
« Newer 1 2 3 4 5 6 7 8 9 10 Older »