Entries filed under 'Fireeye Inc.'

Threat Research Blog

The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.


    Three New Masque Attacks against iOS: Demolishing, Breaking and Hijacking

    By Zhaofeng Chen, Yulong Zhang, Hui Xue, Tao Wei, Fireeye Inc. | Vulnerabilities

    Learn about three variants of the Masque Attack that exist despite Apple's fix/partial fix of the vulnerabilities on iOS 8.1.3.

    Read more...


    Behind the Syrian Conflict’s Digital Frontlines

    By Fireeye Inc. | Threat Intelligence

    Cyber espionage is traditionally understood as a method aimed at achieving an information edge or a strategic goal. However, our research on malware activity related to the ongoing conflict in Syria indicates that such operations can provide actionable military intelligence for an immediate battlefield advantage. Today we release a new report “Behind the Syrian Conflict’s Digital Frontlines,” that documents a well-executed hacking operation that successfully breached the Syrian opposition.

    Read more...


    Black Hat USA Talks: Investigating PowerShell Attacks

    An error has occurred | FireEye

    An error has occurred

     

    Well that wasn’t supposed to happen. Something went wrong when trying to access this page. Please try again in a few minutes while we’re working on it.

    To send feedback about this error, click here.