Entries filed under 'Tony Lee'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
June 10, 2016 10:00 AM By Will Glass, Tony Lee, Parnian Najafi, Nick Richard, Dan Scali | Advanced Malware, Threat Research
Cyber attackers will likely turn their attention to vehicles for their illicit activity, using the car's own high-tech features and connectivity against itself for advanced attacks. Three of the most concerning potential threats looking ahead to the next few years are those posed by manipulating vehicle operation, ransomware and using vehicular systems as command and control (C2) infrastructure for illicit cyber activity.Read more...
March 15, 2016 8:00 AM By Tony Lee, Charles Carmakal | Vulnerabilities, Threat Research
Our experience shows that attackers are increasingly using Citrix solutions to remotely access victim environments post-compromise, instead of using traditional backdoors, remote access tools, or other types of malware. Mandiant and Citrix teamed up to provide guidance on the most significant risks posed to Citrix XenApp and XenDesktop implementations.Read more...
September 15, 2015 8:00 AM By Bill Hau, Josh Homan, Tony Lee | Advanced Malware, Threat Research
August 7, 2013 4:00 AM By Tony Lee, Dennis Hanzlik, Ian Ahl | Threat Research