Entries filed under 'Threat Intelligence'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
April 24, 2014 4:00 AM By Jen Weedon
January 27, 2014 3:40 PM By Richard Bejtlich
Welcome to my first post as a FireEye™ employee! Many of you have asked me what I think of FireEye's acquisition of Mandiant. One of the aspects of the new company that I find most exciting is our increased threat intelligence capabilities. This post will briefly explore what that means for our customers, prospects, and the public.Read more...
December 23, 2013 6:41 PM By Intel Team
Predicting security challenges for the upcoming year is often an exercise in educated guesswork. These forecasts are often based on technological trends (e.g., attack surfaces to be exploited by adversaries, such as mobile devices and enterprise services in the cloud), attempts to influence potential customers ("this threat can only be solved by our widget!"), strategic shifts in adversary intents and motivations, red lines (or the absence thereof) for acceptable behavior and myriad other factors.Read more...
November 6, 2013 8:54 PM By Helena Brito
Happy Day 2 of MIRcon®! Yesterday, Mandiant's CEO Kevin Mandia kicked off MIRcon 2013 with a keynote on attacking the security gap, discussing the necessity of information-sharing and his experience witnessing the evolution of cybercrime. From there we moved on to thought-provoking discussions in both our management and technical tracks.Read more...