I remember (way) back in 1989 when I had just started my career in IT, HP came out with a slogan, "We never stop asking, 'What if....'" What I've come to learn as I moved into the realm of responding to security intrusions is that you should never stop asking, "Now what??"Read more...
Entries filed under 'Malware'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
August 20, 2012 2:42 PM By Ryan Kazanciyan
August 15, 2012 6:12 AM By Vinay Pidathala
August 14, 2012 7:51 PM By John Bradshaw
In addition to insomnia and lack of Star Trek reruns giving me reason to read through U.S. Government regulations, air travel provides another opportunity when I can peruse them. Several areas of the NIST 800-53Revision 4 draft continue to pique my curiosity. Today, it is System and Information Integrity control check SI-14: Non-Persistence.Read more...
August 1, 2012 5:36 PM By Helena Brito
It's hard to believe Black Hat USA is done for this year. It feels like the week whizzed by with all the activities we were up to while representing the M. From sold-out training courses to a signing with Michael Sikorski and Andy Honig for their recently published book, "Practical Malware Analysis"; we had a great time catching up with old friends and meeting new ones.Read more...