A recent targeted attack featured attackers using different technologies to perform reconnaissance activities on a particular target. Users should disable Office macros in their settings and be extra vigilant when enabling macros (especially when prompted) in documents.Read more...
Entries filed under 'Cybersecurity'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
May 20, 2016 2:59 PM By Junfeng Yang | Advanced Malware
Our adversaries are familiar with the RTF format and the inner workings of Microsoft Word, and can devise obfuscation tricks to evade traditional signature-based detection. Understanding hackers perform obfuscation can in turn help us improve our detection of this type of malware.Read more...
November 30, 2014 11:18 PM By Kristen Dennesen, Barry Vengerik, Jonathan Wrolstad, Jordan Berry | Threat Intelligence
A group called FIN4 appears to be stealing insider information to obtain an edge on stock trading.
November 11, 2014 11:00 AM By J. Gomez
Internal Server Error
Cannot serve request to /blog/threat-research.html/category/etc/tags/fireeye-blog-tags/cybersecurity on this server
ApacheSling/2.6 (jetty/9.2.19.v20160908, Java HotSpot(TM) 64-Bit Server VM 1.8.0_121, Linux 3.10.0-514.16.1.el7.x86_64 amd64)