Entries filed under 'intrusion detection'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
August 7, 2012 8:49 PM By John Bradshaw
May 18, 2012 3:00 PM By Grady Summers
I was somewhat unnerved when I saw the evidence for our #3M-Trend this year: the use of publicly available malware in targeted attacks is increasing. After all, when I first started learning about the Advanced Persistent Threat (APT) several years ago, it seemed to be all about custom backdoors and proprietary tools. I remember briefing executives at my organization on how stealthy the attackers were, using never-before-seen methods to evade antivirus and infiltrate the organization. Yet the recent evidence was clear: every intrusion we had investigated in the last year leveraged some sort of publicly available malware.Read more...
M-Trends #2: Everything Old is New Again - Targeted Attackers Using Passive Backdoors to Evade NetworksMay 16, 2012 2:54 PM By Grady Summers
May 14, 2012 4:45 PM By Grady Summers