Home | Latest News | Popular News | Our Network | About | Contact
Security News from 'FireEye Research' | www.SecurityPhresh.com
Security News from 'FireEye Research'
Showing 'Security News from 'FireEye Research'' from 61 to 70
Operation Saffron Rose
26th Jan 2018 [4 months ago] from FireEye Research
There is evolution and development underway within Iranian-basedhacker groups that coincides with Iran’s efforts at controllingpolitical dissent and expanding offensive cyber capabilities. Thecapabilities of threat actors operating from...
DLL Side-Loading: Another Blind-Spot For Anti-Virus
26th Jan 2018 [4 months ago] from FireEye Research
Last month, I presented a talk at the RSA USA Conference on anincreasingly popular threat vector called “Dynamic-Link LibrarySide-Loading” (DLL Side-Loading). As with many vulnerabilities, thisexploit has existed for a rather long time...
If An Android Has A Heart, Does It Bleed?
26th Jan 2018 [4 months ago] from FireEye Research
The OpenSSL Heartbleed vulnerability “allows remote attackers toobtain sensitive information from process memory via crafted packetsthat trigger a buffer over-read” [1].Heartbleed surprised the public by allowing attackers to stealsensitive...
NGOs: Fighting Human Rights Violations And, Now, Cyber Threat Groups
26th Jan 2018 [4 months ago] from FireEye Research
With so many non-government organizations (NGOs) in operation todayaround the world, we asked ourselves a question here at FireEye Labs.Who would think about targeting NGOs?  Steal from a nonprofit? Itwould seem unthinkable to most people....
Crimeware Or APT Malware: Fifty Shades Of Grey
26th Jan 2018 [4 months ago] from FireEye Research
Some cybercriminals build massive botnets to use unsuspectingendpoints for spam, distributed denial-of-service (DDoS) attacks, orlarge-scale click fraud. With the aid of banking Trojans, othercybercriminals create smaller, specialized botnets...
A Detailed Examination Of The Siesta Campaign
26th Jan 2018 [4 months ago] from FireEye Research
Executive SummaryFireEye recently looked deeper into the activity discussed in TrendMicro’sblog and dubbed the “Siesta” campaign. The tools, modus operandi,and infrastructure used in the campaign present two possibilities:either the...
Android.MisoSMS : Its Back! Now With XTEA
26th Jan 2018 [4 months ago] from FireEye Research
 FireEye Labs recently found a moreadvanced variant of Android.MisoSMS, the SMS-stealing malware that weuncovered last December — yet another sign of cybercriminals’growing interest in hijacking mobile devices for surveillance and...
Spear Phishing The News Cycle: APT Actors Leverage Interest In The Disappearance Of Malaysian Flight MH 370
26th Jan 2018 [4 months ago] from FireEye Research
While many advanced persistent threat (APT) groups have increasinglyembraced strategic Web compromise as a malware delivery vector, groupsalso continue to rely on spear-phishing emails that leverage popularnews stories. The recent tragic...
From Windows To Droids: An Insight In To Multi-vector Attack Mechanisms In RATs
26th Jan 2018 [4 months ago] from FireEye Research
FireEye recently observed a targeted attack on a U.S.-based financialinstitution via a spear-phishing email. The payload used in thiscampaign is a tool called WinSpy, which is sold by the author as aspying and monitoring tool. The features...
A Little Bird Told Me: Personal Information Sharing In Angry Birds And Its Ad Libraries
26th Jan 2018 [4 months ago] from FireEye Research
Many popular mobile apps, including Rovio’s ubiquitous Angry Birds,collect and share players’ personal information much more widely thanmost people realize.Some news reports have begun to scratch the surface of thesituation. The New...
« Newer 2 3 4 5 6 7 8 9 10 11 Older »