Entries filed under 'FireEye'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
June 25, 2012 9:00 AM By Ali Islam
October 6, 2010 3:11 AM By Atif Mushtaq
August 21, 2008 8:06 PM By Atif Mushtaq
March 26, 2008 11:45 AM By FireEye | Advanced Malware
The second part of this series will examine the mechanisms that rootkits use in order to provide stealth, data collection, and protection for BOTs and other malware. Since this is a lengthy topic, this part will start with user-land techniques and then part 3 will discuss kernel techniques.Read more...