As cybersecurity becomes more well-known outside our industry, the hope is to draw top talent to some of the most interesting careers within the field, such as reverse engineering. Unfortunately, there is still a large imbalance between men and women in cybersecurity; especially when it comes to highly technical positions.Read more...
Entries filed under 'Ida Pro'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
November 29, 2012 9:48 PM By Jay Smith
In the five years I have been a part of Mandiant's malware analysis team (now formally known as M-Labs) there have been times when I've had to reverse engineer chunks of shellcode. In this post I will give some background on shellcode import resolution techniques and how to automate IDA markup to allow faster shellcode reverse engineering.Read more...
April 12, 2012 5:53 PM By Helena Brito
Black Hat USA 2012 is right around the corner...okay, it is three months away; however, it is never too early to register for Mandiant's highly customized training courses held at this popular technical security conference in Las Vegas, Nevada, July 21-26, 2012.Read more...
June 10, 2009 4:47 PM By Julia Wolf
March 24, 2009 9:30 AM By Julia Wolf