Home | Latest News | Popular News | Our Network | About | Contact
Security News from 'FireEye Research' | www.SecurityPhresh.com
Security News from 'FireEye Research'
Showing 'Security News from 'FireEye Research'' from 1 to 10
CARBANAK Week Part Two: Continuing The CARBANAK Source Code Analysis
23rd Apr 2019 [16 hours ago] from FireEye Research
In the previousinstallment, we wrote about how string hashing was used inCARBANAK to manage Windows API resolution throughout the entirecodebase. But the authors used this same string hashing algorithm foranother task as well. In this installment,...
CARBANAK Week Part One: A Rare Occurrence
22nd Apr 2019 [42 hours ago] from FireEye Research
It is very unusual for FLARE to analyze a prolifically-used,privately-developed backdoor only to later have the source code andoperator tools fall into our laps. Yet this is the extraordinarycircumstance that sets the stage for CARBANAK...
Spear Phishing Campaign Targets Ukraine Government And Military; Infrastructure Reveals Potential Link To So-Called Luhansk Peoples Republic
16th Apr 2019 [8 days ago] from FireEye Research
In early 2019, FireEye Threat Intelligence identified a spearphishing email targeting government entities in Ukraine. The spearphishing email included a malicious LNK file with PowerShell script todownload the second-stage payload from...
FLASHMINGO: The FireEye Open Source Automatic Analysis Tool For Flash
14th Apr 2019 [9 days ago] from FireEye Research
Adobe Flash is one of the most exploited software components of thelast decade. Its complexity and ubiquity make it an obvious target forattackers. Public sources list more than onethousand CVEs being assigned to the Flash Player alonesince...
TRITON Actor TTP Profile, Custom Attack Tools, Detections, And ATT&CK Mapping
9th Apr 2019 [14 days ago] from FireEye Research
OverviewFireEye can now confirm that we have uncovered and are respondingto an additional intrusion by the attacker behind TRITON at adifferent critical infrastructure facility.In December 2017, FireEye publicly released our first analysis...
Churning Out Machine Learning Models: Handling Changes In Model Predictions
9th Apr 2019 [15 days ago] from FireEye Research
IntroductionMachine learning (ML) is playing an increasingly important role incyber security. Here at FireEye, we employ ML for a variety of taskssuch as: antivirus,maliciousPowerShell detection, and correlatingthreat actor behavior. While...
Finding Weaknesses Before The Attackers Do
8th Apr 2019 [16 days ago] from FireEye Research
This blog post originally appeared as an article in M-Trends 2019.FireEye Mandiant red team consultants perform objectives-basedassessments that emulate real cyber attacks by advanced and nationstate attackers across the entire attack lifecycle...
Pick-Six: Intercepting A FIN6 Intrusion, An Actor Recently Tied To Ryuk And LockerGoga Ransomware
5th Apr 2019 [19 days ago] from FireEye Research
SummaryRecently, FireEye Managed Defense detected and responded to a FIN6intrusion at a customer within the engineering industry, which seemedout of character due to FIN6’s historical targeting of payment carddata. The intent of the intrusion...
FireEye Cyber Defense Summit 2016: The Incident Response Track – Technical Details And Solutions That Work
4th Apr 2019 [20 days ago] from FireEye Research
2016 has been a year of significant change to the cyber securitylandscape. The rapid proliferation of ransomware and the emergence ofInternet of Things mass compromise has changed the landscape forresponders. Similarly, existing threats...
Commando VM: The First Of Its Kind Windows Offensive Distribution
28th Mar 2019 [26 days ago] from FireEye Research
For penetration testers looking for a stable and supportedLinux testing platform, the industry agrees that Kali is the go-toplatform. However, if you’d prefer to use Windows as an operatingsystem, you may have noticed that a worthy platform...
1 2 3 4 5 6 7 8 9 10 Older »