This blog covers the growing trend of cyber criminals using blockchain domains for malicious infrastructure.Read more...
Entries filed under 'Kimberly Goody'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
How the Rise of Cryptocurrencies Is Shaping the Cyber Crime Landscape: Blockchain Infrastructure UseApril 18, 2018 2:00 AM By Randi Eitzman, Kimberly Goody, Jessa Valdez
CVE-2017-10271 Used to Deliver CryptoMiners: An Overview of Techniques Used Post-Exploitation and Pre-MiningFebruary 15, 2018 11:30 AM By Rakesh Sharma, Kimberly Goody, Akhil Reddy
FireEye researchers recently observed threat actors abusing CVE-2017-10271 to deliver various cryptocurrency miners.Read more...