Home | Latest News | Popular News | Our Network | About | Contact
Security News from 'FireEye Research' | www.SecurityPhresh.com
Security News from 'FireEye Research'
Showing 'Security News from 'FireEye Research'' from 81 to 90
The Little Signature That Could: The Curious Case Of CZ Solution
26th Jan 2018 [4 months ago] from FireEye Research
Malware authors are always looking for new ways to masquerade theiractions. Attackers are looking for their malware to be not only fullyundetectable, but also appear valid on a system, so as not to drawattention. Digital signatures are...
Operation Tovar: The Latest Attempt To Eliminate Key Botnets
26th Jan 2018 [4 months ago] from FireEye Research
Coordinated botnet disruptions have increased in pace and popularityover the last few years as more private companies work withinternational law enforcement agencies to combat malware infections ona grand scale. OperationTovar, announced...
Havex, It’s Down With OPC
26th Jan 2018 [4 months ago] from FireEye Research
FireEye recently analyzed the capabilities of a variant of Havex(referred to by FireEye as “Fertger” or “PEACEPIPE”), the firstpublicized malware reported to actively scan OPC servers used forcontrolling SCADA (Supervisory Control...
BrutPOS: RDP Bruteforcing Botnet Targeting POS Systems
26th Jan 2018 [4 months ago] from FireEye Research
There have been an increasing number of headlines about breaches atretailers in which attackers have made off with credit card data aftercompromising point-of-sale (POS) terminals. However, what is notcommonly discussed is the fact that...
Molerats, Here For Spring!
26th Jan 2018 [4 months ago] from FireEye Research
Between29 April and 27 May, FireEye Labs identified several new Moleratsattacks targeting at least one major U.S. financial institution andmultiple, European government organizations.Whenwe last published details relevant to Moleratsactivity...
Preying On Insecurity: Placebo Applications With No Functionality On Google Play And Amazon.com
26th Jan 2018 [4 months ago] from FireEye Research
FireEye mobile security researchers recently uncovered, and notifiedGoogle and Amazon to take down, a series of anti-virus and securityconfiguration apps that were nothing more than scams. Written easilyby a thieving developer with just...
Turing Test In Reverse: New Sandbox-Evasion Techniques Seek Human Interaction
26th Jan 2018 [4 months ago] from FireEye Research
Last year, we published a paper titled HotKnives Through Butter, Evading File-Based Sandboxes.  In thispaper, we explained many sandbox evasion methods--and todays blogpost adds to our growing catalog. In the past, for example, we detailed...
What Are You Doing? – DSEncrypt Malware
26th Jan 2018 [4 months ago] from FireEye Research
Executive Summary Have you ever downloaded and installed a large Android applicationthat had very few actual UI elements or functionality? Recently,FireEye Labs mobile security researchers have discovered a new kind ofmobile malware that...
A Threatening Threat Map
25th Jan 2018 [4 months ago] from FireEye Research
FireEye recently released a ThreatMap to visualize some of our ThreatIntelligence Data. The ThreatMap data is a sample of real data collected from ourtwo-way sharing customers for the past 30 days. The data representedin the map is malware...
Malware Callbacks
23rd Jan 2018 [4 months ago] from FireEye Research
Today we released our first-ever analysis of malware callbacks. Ourreport can be accessed here: http://www2.fireeye.com/WEB2013ATLReport.html. FireEye monitored more than 12 million malware communications seekinginstructions—or callbacks—across...
« Newer 3 4 5 6 7 8 9 10 11 12 Older »