Entries filed under 'APT'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
August 14, 2012 7:51 PM By John Bradshaw
In addition to insomnia and lack of Star Trek reruns giving me reason to read through U.S. Government regulations, air travel provides another opportunity when I can peruse them. Several areas of the NIST 800-53Revision 4 draft continue to pique my curiosity. Today, it is System and Information Integrity control check SI-14: Non-Persistence.Read more...
August 16, 2012 7:54 PM By Helena Brito
August 6, 2012 7:14 PM By Jim Aldridge
Last week at Black Hat, I presented a briefing entitled, "Targeted Intrusion Remediation: Lessons from the Front Lines." During my presentation I made three key points:Read more...
July 17, 2012 7:32 PM By Helena Brito
Say the word "hack" or "hacker", and the reaction is generally one of fear, disdain or both. The term generally brings to mind some variation of a lone, shifty-eyed figure hunched over a keyboard, mumbling to himself while orchestrating a virtual smash-and-grab.Read more...