Entries filed under 'Cybersecurity'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
February 10, 2014 5:48 PM By Helena Brito
As a follow-up to our recently held webinar Fresh Prints of Mal-ware: Keep Your Network Out of the Danger Zone, questions answered by presenters Lianis Oliva and Evan Peña are listed below. To view the archived webinar, please click here.Read more...
January 2, 2014 9:14 PM By Helena Brito
FireEye, the leader in stopping today's advanced cyber-attacks, announced today that it has acquired privately held Mandiant, the leading provider of advanced endpoint security products and security incident response management solutions. The acquisition, which recognizes the ever-increasing intensity of cyber-attacks and follows nearly two years of collaboration, creates the industry's leading advanced threat protection vendor with the ability to find and stop attacks at every stage of the attack life cycle. The transaction closed on December 30, 2013.Read more...
December 23, 2013 6:41 PM By Intel Team
Predicting security challenges for the upcoming year is often an exercise in educated guesswork. These forecasts are often based on technological trends (e.g., attack surfaces to be exploited by adversaries, such as mobile devices and enterprise services in the cloud), attempts to influence potential customers ("this threat can only be solved by our widget!"), strategic shifts in adversary intents and motivations, red lines (or the absence thereof) for acceptable behavior and myriad other factors.Read more...
December 11, 2013 8:49 PM By Helena Brito