Cyber security events can negatively impact a business, and threat actors can pose a particular threat to those organizations in the midst of combining their assets and operations. Here's why companies going through mergers and acquisitions make even more attractive targets.Read more...
Entries filed under 'Cyber'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
August 18, 2016 8:00 AM By Timothy Parisi, Evan Pena | Vulnerabilities
When a Security Operations Center (SOC) doesn't have the capabilities to detect WMI activity from both a network and endpoint perspective, the lack of visibility can provide threat actors a perfect opening for attacks. Here's how FireEye solves the problem.
August 17, 2016 12:15 PM By Ronghwa Chong | Advanced Malware
July 27, 2016 10:00 AM By Evan Pena, Chris King, Christopher Truncer | Vulnerabilities
The FireEye Red Team creates and modifies tools as a need is identified. Some tools introduce new techniques to accomplish a goal, while others simply automate existing tools and techniques to scale better. This blog discusses some new tools we've developed or significantly contributed to that make our lives easier, and offers some case studies to demonstrate them.
July 18, 2016 8:00 AM By Ankit Anubhav , Raghav Ellur | Advanced Malware
A new feature of the FireEye Endpoint Security platform detected a Cerber ransomware campaign and alerted customers in the field. The campaign distributed a malicious Microsoft Word document that could contact an attacker-congrolled website to download and install the Cerber family of ransomware.