Entries filed under 'Advanced Persistent Threat'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
April 15, 2014 3:00 PM By Nart Villeneuve, Mike Scott
March 11, 2014 3:40 PM By Helena Brito
As part of our podcast series, live from the RSA USA Conference, we are digging into the topic of advanced threats, attacks, and best practices to implement on the network. In this podcast, our host, Richard Bejtlich, sits down with Chris Bream, director within Professional Services at Mandiant to discuss the latest trends in attacks, how they are continuing to evolve their tactics, and the shift that is required in the security industry to address the latest threat landscape.Read more...
February 19, 2014 4:56 PM By Devon Kerr
About a month ago, I was involved in an investigation that revealed a targeted attacker using an interesting variation of a well-known persistence mechanism - a technique that is relevant both to incident responders hunting for evil and penetration testers looking to add post-exploitation methods to their toolkit. Today, I'm going to talk about this persistence mechanism and discuss some ways you might go about identifying it in your environment.Read more...
January 31, 2014 6:00 PM By Intel Team
What's the best way to get intelligence analysts to geek out? Let them sink their teeth into new piles of data! And that's exactly what's been happening here since the FireEye™ and Mandiant® intelligence teams joined forces. Our intel teams have been busy with show-and-tell, talking about the threat groups we're tracking and their latest tactics. We've been swapping best practices and peeking behind the curtain at the vast repositories of data and experience both have amassed.Read more...