Mandiant recently responded to an incident at a critical infrastructure organization where an attacker deployed malware designed to manipulate industrial safety systems.Read more...
Entries filed under 'Dan Scali'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
Attackers Deploy New ICS Attack Framework “TRITON” and Cause Operational Disruption to Critical InfrastructureDecember 14, 2017 10:00 AM By Blake Johnson, Nathan Brubaker, Christopher Glyer, Dan Caban, Marina Krotofil, Dan Scali
June 10, 2016 10:00 AM By Will Glass, Tony Lee, Parnian Najafi, Nick Richard, Dan Scali | Advanced Malware
Cyber attackers will likely turn their attention to vehicles for their illicit activity, using the car's own high-tech features and connectivity against itself for advanced attacks. Three of the most concerning potential threats looking ahead to the next few years are those posed by manipulating vehicle operation, ransomware and using vehicular systems as command and control (C2) infrastructure for illicit cyber activity.Read more...