We recently detected the resurgence of a coin mining campaign with a novel and unconventional infection vector in the form of an iFRAME embedded in a PE binary.Read more...
Entries filed under 'Social Engineering'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
September 16, 2014 4:49 PM By Chuck Willis
Often in discussions with customers and potential customers, questions arise about our penetration testing services, as well as penetration testing in general. In this post, we want to walk through Mandiant's take on the five W's of penetration testing, in hopes of helping those of you who many have some of these same questions. For clarity, we are going to walk through these W's in a non-traditional order.Read more...
June 10, 2014 4:00 AM By Mike Scott