Mandiant recently responded to an incident at a critical infrastructure organization where an attacker deployed malware designed to manipulate industrial safety systems.Read more...
Entries filed under 'Dan Scali'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
Attackers Deploy New ICS Attack Framework “TRITON” and Cause Operational Disruption to Critical InfrastructureDecember 14, 2017 10:00 AM By Blake Johnson, Nathan Brubaker, Christopher Glyer, Dan Caban, Marina Krotofil, Dan Scali
June 10, 2016 10:00 AM By Will Glass, Tony Lee, Parnian Najafi, Nick Richard, Dan Scali | Advanced Malware
Cyber attackers will likely turn their attention to vehicles for their illicit activity, using the car's own high-tech features and connectivity against itself for advanced attacks. Three of the most concerning potential threats looking ahead to the next few years are those posed by manipulating vehicle operation, ransomware and using vehicular systems as command and control (C2) infrastructure for illicit cyber activity.Read more...