In the past, hackers have attempted to compromise targeted organizations by sending phishing email directly to their users. However, there seems to be a shift away from this trend in the recent years. Hackers were observed to conduct multi-prong approaches to targeting the organization of interest and their affiliated companies.Read more...
Entries filed under 'Chong Rong Hwa'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
July 24, 2014 9:00 PM By Geok Meng Ong, Chong Rong Hwa | Threat Intelligence, Threat Research, Advanced Malware, Targeted Attack
October 24, 2013 8:08 PM By Geok Meng Ong, Chong Rong Hwa, Nart Villeneuve | Threat Research
June 18, 2013 2:00 PM By Chong Rong Hwa | Threat Research
April 1, 2013 6:45 PM By Chong Rong Hwa