Home | Latest News | Popular News | Our Network | About | Contact
Security News from 'FireEye Research' | www.SecurityPhresh.com
Security News from 'FireEye Research'
Showing 'Security News from 'FireEye Research'' from 1 to 10
APT10 Targeting Japanese Corporations Using Updated TTPs
13th Sep 2018 [5 days ago] from FireEye Research
IntroductionIn July 2018, FireEye devices detected and blocked what appears tobe APT10 (Menupass) activity targeting the Japanese media sector.APT10 is a Chinese cyber espionage group that FireEye has trackedsince 2009, and they have a...
WannaCry Malware Profile
7th Sep 2018 [11 days ago] from FireEye Research
WannaCry (also known as WCry or WanaCryptor) malware is aself-propagating (worm-like) ransomware that spreads through internalnetworks and over the public internet by exploiting a vulnerability inMicrosoft’s Server Message Block (SMB)...
Richard Bejtlich On His Latest Book, "The Practice Of Network Security Monitoring"
7th Sep 2018 [11 days ago] from FireEye Research
The Practice of Network SecurityMonitoringEveryone wants to know how to find intruders on theirnetworks. I learned one approach when I served in the Air ForceComputer Emergency Response Team (AFCERT) as a captain from 1998 to2001. When...
SYNful Knock - A Cisco Router Implant - Part I
7th Sep 2018 [11 days ago] from FireEye Research
SYNful Knock - A Cisco router implant - Part I
Fallout Exploit Kit Used In Malvertising Campaign To Deliver GandCrab Ransomware
6th Sep 2018 [13 days ago] from FireEye Research
Towards the end of August 2018, FireEye identified a new exploit kit(EK) that was being served up as part of a malvertising campaignaffecting users in Japan, Korea, the Middle East, Southern Europe, andother countries in the Asia Pacific...
Suspected Iranian Influence Operation Leverages Network Of Inauthentic News Sites & Social Media Targeting Audiences In U.S., UK, Latin America,...
21st Aug 2018 [28 days ago] from FireEye Research
FireEye has identified a suspected influence operation that appearsto originate from Iran aimed at audiences in the U.S., U.K., LatinAmerica, and the Middle East. This operation is leveraging a networkof inauthentic news sites and clusters...
Announcing The Fifth Annual Flare-On Challenge
15th Aug 2018 [one month ago] from FireEye Research
The FireEye Labs Advanced Reverse Engineering (FLARE) team’s annualreverse engineering challenge will start at 8:00 p.m. ET on Aug. 24,2018. This is a CTF-style challenge for all active and aspiringreverse engineers, malware analysts,...
BIOS Boots What? Finding Evil In Boot Code At Scale!
8th Aug 2018 [one month ago] from FireEye Research
The second issue is that reverse engineering all boot records isimpractical. Given the job of determining if a single system isinfected with a bootkit, a malware analyst could acquire a disk imageand then reverse engineer the boot bytes...
On The Hunt For FIN7: Pursuing An Enigmatic And Evasive Global Criminal Operation
1st Aug 2018 [2 months ago] from FireEye Research
On Aug. 1, 2018, the UnitedStates District Attorney’s Office for the Western District ofWashington unsealed indictments and announced the arrests of threeindividuals within the leadership ranks of a criminal organizationthat aligns with...
Microsoft Office Vulnerabilities Used To Distribute FELIXROOT Backdoor In Recent Campaign
26th Jul 2018 [2 months ago] from FireEye Research
Campaign DetailsIn September 2017, FireEye identified the FELIXROOT backdoor as apayload in a campaign targeting Ukrainians and reported it to ourintelligence customers. The campaign involved malicious Ukrainian bankdocuments, which contained...
1 2 3 4 5 6 7 8 9 10 Older »