A look at IMA - Integrity Measurement Architecture - which can improve your visibility into Linux process execution and help you in find more evil in your network.Read more...
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
November 4, 2016 4:53 PM By Nick Harbour | Threat Research
October 20, 2016 8:00 AM By Dr. Fahim Abbasi, Abdul Salam, Dr. Farrukh Shahzad, Safwan Khan | Threat Research
An earlier phishing campaign - Zycode - that targeted Apple users in China is active again. The threat actors appear to be looking for Apple IDs and passwords.
October 13, 2016 8:00 AM By Taha Karim, Daniel Regalado | Threat Research, Advanced Malware
For years, payment card fraud has been extremely profitable for malicious actors. FireEye Labs has recently observed a Brazilian group that specializes in payment card fraud operations, using several methods to compromise and aquire already compromised payment card credientials.Read more...
October 7, 2016 8:00 AM By Muhammad Hasib Latif, Dr. Farrukh Shahzad | Threat Intelligence, Threat Research, Advanced Malware
Malware writers are always looking for new ways to evade analysis frameworks and sandboxes to successfully breach targeted environments and platforms. WMI provides a simple way of environment detection to evade sandboxes and dynamic analysis tools, which seem to be underestimated by the security community. This blog looks at evasion samples.Read more...