Entries filed under 'APT'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
December 20, 2013 4:48 PM By Helena Brito
Everyone likes something for free. And there is no better place to go to get free analysis, intelligence and tools than The Armory on M-Unition. During the past year, we've offered intelligence and analysis on new threat activity, sponsored open source projects and offered insight on free tools like Redline™, all of which has been highlighted on our blog.Read more...
September 11, 2013 3:30 PM By Helena Brito
June 7, 2013 4:16 PM By Helena Brito
As a follow-up to our recently held State of the Hack: Back to the Remediation webinar, questions answered by presenter Jim Aldridge are listed below.Read more...
May 7, 2013 7:06 PM By Richard Bejtlich
Many security professionals worry about intruder access via supply chain exploitation. It's scary to think that an adversary can bypass one or more security controls by infiltrating a business partner, vendor, software provider, or hardware supplier. This article shares five tips for mitigating key elements of supply chain risk.Read more...