Home | Latest News | Popular News | Our Network | About | Contact
Security News from 'FireEye Research' | www.SecurityPhresh.com
Security News from 'FireEye Research'
Showing 'Security News from 'FireEye Research'' from 1 to 10
FLARE VM Update
14th Nov 2018 [5 days ago] from FireEye Research
FLARE VM is the first of its kind reverse engineering and malwareanalysis distribution on Windows platform. Since its introductionin July 2017, FLARE VM has been continuously trusted and used bymany reverse engineers, malware analysts,...
TRITON Attribution: Russian Government-Owned Lab Most Likely Built Custom Intrusion Tools For TRITON Attackers
22nd Oct 2018 [28 days ago] from FireEye Research
OverviewIn a previous blog post we detailed the TRITONintrusion that impacted industrial control systems (ICS) at acritical infrastructure facility. We now track this activity set asTEMP.Veles. In this blog post we provide additional informationlinking...
ICS Tactical Security Trends: Analysis Of The Most Frequent Security Risks Observed In The Field
11th Oct 2018 [one month ago] from FireEye Research
IntroductionFireEye iSIGHT Intelligence compiled extensive data from dozens ofICS security health assessment engagements (ICS Healthcheck) performedby Mandiant, FireEyes consulting team, to identify the most pervasiveand highest priority...
2018 Flare-On Challenge Solutions
5th Oct 2018 [one month ago] from FireEye Research
We are pleased to announce the conclusion of the fifth annualFlare-On Challenge. The numbers are in and we can safely say that thiswas by far the most difficult challenge we’ve ever hosted. We plan toreduce the difficulty next year, so...
FLARE Script Series: Reverse Engineering WebAssembly Modules Using The Idawasm IDA Pro Plugin
5th Oct 2018 [2 months ago] from FireEye Research
IntroductionThis post continues the FireEye Labs Advanced Reverse Engineering(FLARE) script series. Here, we introduce idawasm, an IDA Pro pluginthat provides a loader and processor modules for WebAssembly modules.idawasm works on all operating...
APT38: Details On New North Korean Regime-Backed Threat Group
3rd Oct 2018 [2 months ago] from FireEye Research
Today, we are releasing details on the threat group that we believeis responsible for conducting financial crime on behalf of the NorthKorean regime, stealing millions of dollars from banks worldwide. Thegroup is particularly aggressive;...
Increased Use Of A Delphi Packer To Evade Malware Classification
20th Sep 2018 [2 months ago] from FireEye Research
IntroductionThe concept of packing or crypting amalicious program is widely popular among threat actors looking tobypass or defeat analysis by static and dynamic analysis tools.Evasion of classification and detection is an arms race in...
Click It Up: Targeting Local Government Payment Portals
18th Sep 2018 [2 months ago] from FireEye Research
FireEye has been tracking a campaign this year targeting web paymentportals that involves on-premise installations of Click2Gov. Click2Govis a web-based, interactive self-service bill-pay software solutiondeveloped by Superion. It includes...
APT10 Targeting Japanese Corporations Using Updated TTPs
13th Sep 2018 [2 months ago] from FireEye Research
IntroductionIn July 2018, FireEye devices detected and blocked what appears tobe APT10 (Menupass) activity targeting the Japanese media sector.APT10 is a Chinese cyber espionage group that FireEye has trackedsince 2009, and they have a...
WannaCry Malware Profile
7th Sep 2018 [2 months ago] from FireEye Research
WannaCry (also known as WCry or WanaCryptor) malware is aself-propagating (worm-like) ransomware that spreads through internalnetworks and over the public internet by exploiting a vulnerability inMicrosoft’s Server Message Block (SMB)...
1 2 3 4 5 6 7 8 9 10 Older »