Home | Latest News | Popular News | Our Network | About | Contact
Security News from 'FireEye Research' | www.SecurityPhresh.com
Security News from 'FireEye Research'
Showing 'Security News from 'FireEye Research'' from 11 to 20
Richard Bejtlich On His Latest Book, "The Practice Of Network Security Monitoring"
7th Sep 2018 [2 months ago] from FireEye Research
The Practice of Network SecurityMonitoringEveryone wants to know how to find intruders on theirnetworks. I learned one approach when I served in the Air ForceComputer Emergency Response Team (AFCERT) as a captain from 1998 to2001. When...
SYNful Knock - A Cisco Router Implant - Part I
7th Sep 2018 [2 months ago] from FireEye Research
SYNful Knock - A Cisco router implant - Part I
Fallout Exploit Kit Used In Malvertising Campaign To Deliver GandCrab Ransomware
6th Sep 2018 [2 months ago] from FireEye Research
Towards the end of August 2018, FireEye identified a new exploit kit(EK) that was being served up as part of a malvertising campaignaffecting users in Japan, Korea, the Middle East, Southern Europe, andother countries in the Asia Pacific...
Suspected Iranian Influence Operation Leverages Network Of Inauthentic News Sites & Social Media Targeting Audiences In U.S., UK, Latin America,...
21st Aug 2018 [3 months ago] from FireEye Research
FireEye has identified a suspected influence operation that appearsto originate from Iran aimed at audiences in the U.S., U.K., LatinAmerica, and the Middle East. This operation is leveraging a networkof inauthentic news sites and clusters...
Announcing The Fifth Annual Flare-On Challenge
15th Aug 2018 [3 months ago] from FireEye Research
The FireEye Labs Advanced Reverse Engineering (FLARE) team’s annualreverse engineering challenge will start at 8:00 p.m. ET on Aug. 24,2018. This is a CTF-style challenge for all active and aspiringreverse engineers, malware analysts,...
BIOS Boots What? Finding Evil In Boot Code At Scale!
8th Aug 2018 [3 months ago] from FireEye Research
The second issue is that reverse engineering all boot records isimpractical. Given the job of determining if a single system isinfected with a bootkit, a malware analyst could acquire a disk imageand then reverse engineer the boot bytes...
On The Hunt For FIN7: Pursuing An Enigmatic And Evasive Global Criminal Operation
1st Aug 2018 [4 months ago] from FireEye Research
On Aug. 1, 2018, the UnitedStates District Attorney’s Office for the Western District ofWashington unsealed indictments and announced the arrests of threeindividuals within the leadership ranks of a criminal organizationthat aligns with...
Microsoft Office Vulnerabilities Used To Distribute FELIXROOT Backdoor In Recent Campaign
26th Jul 2018 [4 months ago] from FireEye Research
Campaign DetailsIn September 2017, FireEye identified the FELIXROOT backdoor as apayload in a campaign targeting Ukrainians and reported it to ourintelligence customers. The campaign involved malicious Ukrainian bankdocuments, which contained...
How The Rise Of Cryptocurrencies Is Shaping The Cyber Crime Landscape: The Growth Of Miners
17th Jul 2018 [4 months ago] from FireEye Research
IntroductionCyber criminals tend to favor cryptocurrencies because they providea certain level of anonymity and can be easily monetized. This interesthas increased in recent years, stemming far beyond the desire tosimply use cryptocurrencies...
Chinese Espionage Group TEMP.Periscope Targets Cambodia Ahead Of July 2018 Elections And Reveals Broad Operations Globally
10th Jul 2018 [4 months ago] from FireEye Research
IntroductionFireEye has examined a range of TEMP.Periscope activity revealingextensive interest in Cambodias politics, with active compromises ofmultiple Cambodian entities related to the country’s electoral system.This includes compromises...
« Newer 1 2 3 4 5 6 7 8 9 10 Older »