By developing custom C#-based assemblies, attackers no longer need to rely on the tools present on the target system; they can instead write and deliver their own tools using a technique we call Bring Your Own Land (BYOL).Read more...
Entries filed under 'Red Teaming'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
April 4, 2018 7:00 AM By Jurgen Kutscher
What have incident responders observed and learned from cyber attacks in 2017? Read our M-Trends 2018 report to find out.Read more...
July 27, 2016 10:00 AM By Evan Pena, Chris King, Christopher Truncer | Vulnerabilities
The FireEye Red Team creates and modifies tools as a need is identified. Some tools introduce new techniques to accomplish a goal, while others simply automate existing tools and techniques to scale better. This blog discusses some new tools we've developed or significantly contributed to that make our lives easier, and offers some case studies to demonstrate them.
March 23, 2016 8:00 AM By Austin Baker | Exploits
Two-factor solutions can be highly effective defensive tools in your fight against advanced attackers when implemented securely. Your overtaxed and understaffed security team is likely already facing 99 other security problems - don’t let two-factor authentication be one.Read more...