As the pro-democracy movement in Hong Kong has continued, we’ve been watching for indications of confrontation taking place in cyberspace. Protests began in September and have continued to escalate.Read more...
Entries filed under 'Cybersecurity'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
Operation Poisoned Handover: Unveiling Ties Between APT Activity in Hong Kong’s Pro-Democracy MovementNovember 3, 2014 8:00 AM By Ned Moran, Mike Oppenheim, Mike Scott | Threat Intelligence, Threat Research
October 27, 2014 4:00 AM | Threat Intelligence, Threat Research
October 13, 2014 7:00 PM | Threat Intelligence, Threat Research
October 6, 2014 10:00 AM By Nart Villeneuve | Targeted Attack
May 19, 2014 3:53 PM By Helena Brito
Today's organizations are beginning to recognize the intrinsic value of a well thought-out cybersecurity strategy, and with new attacks happening daily, the stakes are much higher. Threat trends and research play a large role in understanding the adversary and helping these organizations stay ahead the curve.Read more...