Home | Latest News | Popular News | Our Network | About | Contact
Security News from 'FireEye Research' | www.SecurityPhresh.com
Security News from 'FireEye Research'
Showing 'Security News from 'FireEye Research'' from 41 to 50
Fake Software Update Abuses NetSupport Remote Access Tool
5th Apr 2018 [8 months ago] from FireEye Research
Over the last few months, FireEye has tracked an in-the-wild campaignthat leverages compromised sites to spread fake updates. In somecases, the payload was the NetSupport Manager remote access tool(RAT). NetSupport Manager is a commercially...
Introducing Monitor.app For MacOS
4th Apr 2018 [8 months ago] from FireEye Research
UPDATE (April 4, 2018): Monitor.app now supports macOS 10.13.As a malware analyst or systems programmer, having a suite of soliddynamic analysis tools is vital to being quick and effective. Thesetools enable us to understand malware capabilities...
M-Trends 2018
4th Apr 2018 [8 months ago] from FireEye Research
What have incident responders observed and learned from cyber attacksin 2017? Just as in prior years, we have continued to see the cybersecurity threat landscape evolve. Over the past twelve months we haveobserved a number of new trends...
Cerber: Analyzing A Ransomware Attack Methodology To Enable Protection
3rd Apr 2018 [8 months ago] from FireEye Research
Ransomware is a common method of cyber extortion for financial gainthat typically involves users being unable to interact with theirfiles, applications or systems until a ransom is paid. Accessibilityof cryptocurrency such as Bitcoin has...
SANNY Malware Delivery Method Updated In Recently Observed Attacks
23rd Mar 2018 [8 months ago] from FireEye Research
IntroductionIn the third week of March 2018, through FireEye’s Dynamic ThreatIntelligence, FireEye discovered malicious macro-based Microsoft Worddocuments distributing SANNY malware to multiple governmentsworldwide. Each malicious document...
DOSfuscation: Exploring The Depths Of Cmd.exe Obfuscation And Detection Techniques
21st Mar 2018 [8 months ago] from FireEye Research
Skilled attackers continually seek out new attack vectors, whileemploying evasion techniques to maintain the effectiveness of oldvectors, in an ever-changing defensive landscape. Many of these threatactors employ obfuscation frameworks...
Suspected Chinese Cyber Espionage Group (TEMP.Periscope) Targeting U.S. Engineering And Maritime Industries
15th Mar 2018 [8 months ago] from FireEye Research
Intrusions Focus on the Engineering and Maritime SectorSince early 2018, FireEye (including our FireEye as a Service(FaaS), Mandiant Consulting, and iSIGHT Intelligence teams) has beentracking an ongoing wave of intrusions targeting engineering...
Iranian Threat Group Updates Tactics, Techniques And Procedures In Spear Phishing Campaign
13th Mar 2018 [8 months ago] from FireEye Research
IntroductionFrom January 2018 to March 2018, through FireEye’s Dynamic ThreatIntelligence, we observed attackers leveraging the latest codeexecution and persistence techniques to distribute maliciousmacro-based documents to individuals...
APT37 (Reaper): The Overlooked North Korean Actor
20th Feb 2018 [9 months ago] from FireEye Research
On Feb. 2, 2018, we published a blogdetailing the use of an Adobe Flash zero-dayvulnerability (CVE-2018-4878) by a suspected North Korean cyberespionage group that we now track as APT37 (Reaper).Our analysis of APT37’s recent activity...
CVE-2017-10271 Used To Deliver CryptoMiners: An Overview Of Techniques Used Post-Exploitation And Pre-Mining
15th Feb 2018 [9 months ago] from FireEye Research
IntroductionFireEye researchers recently observed threat actors abusingCVE-2017-10271 to deliver various cryptocurrency miners.CVE-2017-10271 is a known input validation vulnerability that existsin the WebLogic Server Security Service (WLS...
« Newer 1 2 3 4 5 6 7 8 9 10 Older »