A look at IMA - Integrity Measurement Architecture - which can improve your visibility into Linux process execution and help you in find more evil in your network.Read more...
No such category found
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
November 4, 2016 4:53 PM By Nick Harbour
October 20, 2016 8:00 AM By Dr. Fahim Abbasi, Abdul Salam, Dr. Farrukh Shahzad, Safwan Khan
An earlier phishing campaign - Zycode - that targeted Apple users in China is active again. The threat actors appear to be looking for Apple IDs and passwords.
October 13, 2016 8:00 AM By Taha Karim, Daniel Regalado | Advanced Malware
For years, payment card fraud has been extremely profitable for malicious actors. FireEye Labs has recently observed a Brazilian group that specializes in payment card fraud operations, using several methods to compromise and aquire already compromised payment card credientials.Read more...
October 7, 2016 8:00 AM By Muhammad Hasib Latif, Dr. Farrukh Shahzad | Threat Intelligence, Advanced Malware
Malware writers are always looking for new ways to evade analysis frameworks and sandboxes to successfully breach targeted environments and platforms. WMI provides a simple way of environment detection to evade sandboxes and dynamic analysis tools, which seem to be underestimated by the security community. This blog looks at evasion samples.Read more...