Entries filed under 'Jen Weedon'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
May 20, 2015 7:00 AM By Nick Rossman, Jens Monrad, Jen Weedon | Threat Intelligence, Threat Research
The Nordic region has several areas that are prime targets for cyber attacks, both to monetize stolen data for financial gain and to benefit government entities. A new FireEye Threat Intelligence report takes a look at who's doing the targeting and who's in the crosshairs.
September 17, 2014 7:28 PM By Jen Weedon | Threat Intelligence, Threat Research
Today, the Senate Armed Services Committee released information indicating that China-based threat actors were heavily targeting TRANSCOM, the U.S. military’s logistics arm. In terms of the private sector contractors impacted, the intrusions detailed in the Levin report mirror activity FireEye has observed: we frequently see nation state threat actors target not only government, but also private sector organizations in order to obtain military intelligence.Read more...
August 21, 2014 10:00 AM By Jen Weedon | Threat Intelligence, Threat Research
April 24, 2014 4:00 AM By Jen Weedon | Threat Research