I remember (way) back in 1989 when I had just started my career in IT, HP came out with a slogan, "We never stop asking, 'What if....'" What I've come to learn as I moved into the realm of responding to security intrusions is that you should never stop asking, "Now what??"Read more...
Entries filed under 'APT'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
August 16, 2012 7:54 PM By Helena Brito
August 14, 2012 7:51 PM By John Bradshaw
In addition to insomnia and lack of Star Trek reruns giving me reason to read through U.S. Government regulations, air travel provides another opportunity when I can peruse them. Several areas of the NIST 800-53Revision 4 draft continue to pique my curiosity. Today, it is System and Information Integrity control check SI-14: Non-Persistence.Read more...
August 7, 2012 8:49 PM By John Bradshaw
August 6, 2012 7:14 PM By Jim Aldridge
Last week at Black Hat, I presented a briefing entitled, "Targeted Intrusion Remediation: Lessons from the Front Lines." During my presentation I made three key points:Read more...