Ugh, here we go again. As awareness continues to rise about the likelihood of a targeted attack succeeding in an enterprise (a good thing - the awareness, not the likelihood of an attack), security vendor marketing machines mull over the facts in search of a "message" - something to frame their product or service to make it relevant to their customers' most pressing needs.Read more...
Entries filed under 'Mandiant'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
May 30, 2012 2:54 PM By Grady Summers
Recently we hosted Mandiant's fifth Executive Threat Briefing of the year, a lunch event at RN74 in Seattle, WA. We had a great crowd representing a cross-section of companies in the Seattle area, which led to some interesting dialog on how we should respond to cyber espionage and advanced targeted threats.Read more...
M-Trends #6 – It Pays To Be Persistent: Financially Motivated Attackers Are Shifting Toward Long-Term PresenceMay 25, 2012 2:03 PM By Grady Summers
M-Trends #5 – Some Assembly Required: Attackers Are Targeting Companies That Collaborate Within a Supply ChainMay 23, 2012 1:21 PM By Grady Summers
Our fifth M-Trend, taken from this year's M-Trends report, is a mouthful: attackers are targeting companies that collaborate within a supply chain in order to assemble a comprehensive intellectual property portfolio. However, our short title, Some Assembly Required, sums it up pretty well. What it boils down to is that attackers have moved beyond simply targeting individual companies for a single technology. Since 2011, we have seen clear indications that attackers are being instructed to go after more complex technologies that span multiple organizations.Read more...
May 22, 2012 6:53 PM By Sean Cunningham