It's hard to believe Black Hat USA is done for this year. It feels like the week whizzed by with all the activities we were up to while representing the M. From sold-out training courses to a signing with Michael Sikorski and Andy Honig for their recently published book, "Practical Malware Analysis"; we had a great time catching up with old friends and meeting new ones.Read more...
Entries filed under 'Freeware'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
July 19, 2012 4:20 PM By Ryan Kazanciyan
Mandiant RedlineTM and IOC Finder TM collect and parse a huge body of evidence from a running system. In fact, they're based on the same agent software as our flagship Mandiant Intelligent Response® product. During the course of their "audits", these tools conduct comprehensive analysis of the file system (including hashing, time stamps, parsing of PE file structures, and digital signature checks), registry hives, processes in memory, event logs, active network connections,DNS cache contents,web browser history, system restore points, scheduled tasks, prefetch entries, persistence mechanisms, and much more.Read more...
June 28, 2012 4:02 PM By Seth and Steve Davis
May 22, 2012 6:53 PM By Sean Cunningham
May 3, 2012 5:56 PM By Doug Wilson
So far, in working with Redline™ 1.5, I have uncovered a few interesting bits above and beyond what we discussed in the last Fresh Prints of Mal-ware: IOCing Red webinar. I would like to share that with you today, and discuss a recent Google+ Hangout we conducted on the topic of Redline and Indicators of Compromise (IOCs).Read more...