Happy Day 2 of MIRcon®! Yesterday, Mandiant's CEO Kevin Mandia kicked off MIRcon 2013 with a keynote on attacking the security gap, discussing the necessity of information-sharing and his experience witnessing the evolution of cybercrime. From there we moved on to thought-provoking discussions in both our management and technical tracks.Read more...
Entries filed under 'Threat Intelligence'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
September 29, 2016 8:00 AM By FireEye iSIGHT Intelligence | Threat Intelligence, Threat Research
May 18, 2016 8:00 AM By Richard Hummel, Ronghwa Chong, Adam Greenberg, John Miller, David Mainor | Advanced Malware, Threat Research
Ransomware - cyber extortion for financial gain - has been more popular since mid-2015, and FireEye noticed a significant spike in its use in March 2016.Read more...
March 28, 2016 8:00 AM By Nart Villeneuve | Threat Research, Advanced Malware
TREASUREHUNT is a POS malware that appears custom-built for a particular “dump shop” that sells stolen credit card data. TREASUREHUNT enumerates running processes, extracts payment card information from memory, and then transmits this information to a command and control server. This blog takes a closer look.
October 21, 2014 9:00 AM By Ali Mesdaq | Threat Intelligence, Threat Research