Overview of the FireEye portfolio that provides continuous threat protection against today’s advanced threats
Jump to content
This report paper focuses on forensic Analysis and discusses the Windows security controls intended to limit malicious usage of PowerShell, and the authors’ assumptions regarding an attacker’s level of access
This report analyzes first stage command and control (C2) malware callbacks from FireEye clients around the world
A look at how the Sidewinder Targeted Attack allows for threat actors to take over Android devices to track location, take photos, send texts, and more via the ads libraries Android apps are built on.
Insight into the prevailing defense-in-depth security model and how it leaves organizations all but defenseless against determined attackers
Insight into multiple cyber-espionage operations against companies in the U.S. defense industrial base and Iranian dissidents
Comprehensive guide on today's new breed of cyber attacks and how next-generation threat protection can fill the gaps in organizations' network defenses
Insight into this popular cyber attack method and measures to take to ensure legitimate files are not exploited
Examination of the inner workings of the four most commonly exploited Java vulnerabilities
Report on the need for more than traditional security to protect against today’s attacks. Includes Gartner research “Strategies for Dealing With Advanced Targeted Attacks”
Insight into how ministries of foreign affairs in Europe were targeted and compromised by a threat actor FireEye has dubbed “Ke3chang”
Examination of 11 seemingly unrelated APT campaigns that, upon further investigation, reveal shared characteristics that suggest a common “supply-chain” infrastructure
Information on the features that make the China Chopper Web shell a popular tool for cyber attackers and how to better detect it
Insight into the unique characteristics of cyber attack campaigns waged by governments worldwide
Survey findings that detail the top challenges incident response teams face and more
Results of survey on difficulties faced with cloud computing and BYOD, and how to better prepare for investigations in the new IT environment
Report on email as a channel for targeted attacks. Features Gartner research "Email Security Focus Shifts to Address the Risks of Targeted Attacks and Data Loss"
Results of survey on awareness and use of critical security controls
Research and advanced threat trend analysis from the FireEye Malware Intelligence Lab
In-depth analysis of 1H 2011 advanced threat data revealing a new era of dynamic attacks
Report highlighting the inadequacy of traditional IT security based on a survey of large enterprises
Stops advanced attacks that use Web exploits and malware callbacks to compromise networks
The FireEye MIR Platform finds evidence of compromise and forensic artifacts on customer endpoints left behind by attacker activity.
Captures and indexes full packets at extremely rapid speeds for actionable intelligence and rapid incident response
Identifies, analyzes, and blocks mobile attacks within your organization
FireEye Labs analyzes the tools, techniques, and procedures of the attacker groups “Moafee” and “DragonOK” and the close-ties between them in Operation Quantum Entanglement.
Insight into why a flood of alerts doesn’t make you more secure and how you can spot and resolve alerts that matter.
Overview of the emerging mobile threat vector and why common defenses leave organizations vulnerable
This paper explains new Australian government cyber security guidelines around sandboxing, why most sandboxes fail, and what agencies should look for in automated analysis tools.
Paper on the dangers of zero-day attacks and how the 11 zero-day attacks discovered by FireEye in 2013 were used in real-world attacks
Insight into what capabilities federal agencies need to combat advanced threats and solve incident response challenges
Overview of today’s advanced cyber attacks and five reasons cybercriminals see small and midsize businesses as easy targets
Examination of the limitations many security architectures have and how FireEye has an architecture built from the ground up to protect against advanced attacks
Insight into the importance of protecting the data center and its content, how traditional security solutions fall short, and how FireEye can help
Overview of how state and local governments can protect their data and critical infrastructure against today’s advanced cyber attacks
Insight into the drawbacks of sandbox security and what is required for advanced threat protection
Overview of cloud-based sandboxing, on-premise sandbox analysis, and endpoint-based and hybrid approaches and why they do not protect against the new generation of cyber attacks
Overview of why small to medium-sized businesses need protection against advanced cyber attacks
Examination of existing security technologies and the reasons why many fail in stopping today's new breed of cyber attacks
Exploration of the challenges federal CISOs face in balancing compliance with FISMA and protecting against today's advanced targeted threats
Window into the extent to which advanced threats are infiltrating government agencies and the top five security concerns of government CIOs
Insight into how government agencies can take advantage of cloud-based email solutions while still guarding against targeted email attacks
Discussion on the importance of connecting all stages of an advanced targeted attack lifecycle and why traditional defenses are inadequate
Analysis of the FireEye Web Malware Protection System outlining the costs and benefits
Framework of controls for combating today's advanced threats, such as spear phishing, advanced malware, and advanced persistent threats
Deep dive into advanced malware and how to design systems that protect against advanced threats
Primer on the new cyber threat landscape with an in-depth look at the deficiencies of traditional technologies