This part of the blog is delivered with thanks to Brad Duncan. Brad penned this portion of the blog and we're thankful to him for his help here and for his collaboration. For those of you that don't know Brad, he is a Security Researcher at Rackspace. He also runs the blog www.malware-traffic-analysis.net, and he is also a handler at the Internet Storm Center (isc.sans.edu).Read more...
Entries filed under 'Malware'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
September 24, 2015 3:32 PM By April Eubank
As part of our normal course of operations as a cyber threat intelligence provider, we monitor the cyber crime underground and the world of cyber espionage. We provide analysis to our clients on new and emerging threats as well as help them analyze artifacts found on their networks. As you can imagine, we naturally run into large quantities of malware on a daily basis, conduct a great deal of reverse engineering and aide from time to time in incident response. Every once in awhile, we try to share details on what we find and how we find it to the public in the interest of informing the community around new threats and providing actionable analysis to support the hunt and kill missions.Read more...
August 11, 2015 3:35 PM | Threat Research
November 11, 2014 11:00 AM By J. Gomez
Operation Poisoned Handover: Unveiling Ties Between APT Activity in Hong Kong’s Pro-Democracy MovementNovember 3, 2014 8:00 AM By Ned Moran, Mike Oppenheim, Mike Scott | Threat Intelligence, Threat Research
As the pro-democracy movement in Hong Kong has continued, we’ve been watching for indications of confrontation taking place in cyberspace. Protests began in September and have continued to escalate.Read more...