If cybersecurity or risk management are on your radar (and since you're reading this post, I imagine they are), you've probably heard some of the latest on government efforts to insulate critical infrastructure networks from determined targeted threats.Read more...
Entries filed under 'Mandiant'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
August 8, 2012 5:43 PM By Richard Bejtlich
August 7, 2012 8:49 PM By John Bradshaw
August 6, 2012 7:14 PM By Jim Aldridge
Last week at Black Hat, I presented a briefing entitled, "Targeted Intrusion Remediation: Lessons from the Front Lines." During my presentation I made three key points:Read more...
July 25, 2012 6:53 PM By Chuck Willis
We are happy to announce the release of version 1.0 - the first major release - of the Open Web Application Security Project (OWASP) Broken Web Applications project Virtual Machine (VM). This open source project assembles and distributes a VM of web applications with a wide variety of security vulnerabilities. The VM is designed to appeal to a wide variety of audiences, including beginners looking to learn the basics of web application vulnerabilities, developers and testers who want to examine and correct the code that implements vulnerabilities, incident responders desiring to examine evidence of web application attacks in logs, and security professionals looking to test tools and techniques.Read more...