A recent targeted attack featured attackers using different technologies to perform reconnaissance activities on a particular target. Users should disable Office macros in their settings and be extra vigilant when enabling macros (especially when prompted) in documents.Read more...
Entries filed under 'Threat Intel'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
May 18, 2016 8:00 AM By Richard Hummel, Ronghwa Chong, Adam Greenberg, John Miller, David Mainor | Advanced Malware
Ransomware - cyber extortion for financial gain - has been more popular since mid-2015, and FireEye noticed a significant spike in its use in March 2016.Read more...
March 28, 2016 8:00 AM By Nart Villeneuve | Advanced Malware
TREASUREHUNT is a POS malware that appears custom-built for a particular “dump shop” that sells stolen credit card data. TREASUREHUNT enumerates running processes, extracts payment card information from memory, and then transmits this information to a command and control server. This blog takes a closer look.
March 19, 2013 5:44 PM By Intel Team
September 7, 2012 5:01 PM By Helena Brito
Hard as it is to believe, September is upon us - with all the backpacks, early bedtimes and pumpkin spice lattes that entails. In keeping with back-to-school season, M-Unition is going to be focusing this month on learning - going back to the basics on cybersecurity and targeted threats.Read more...