FireEye Labs recently discovered a malicious phishing domain designed to steal a variety of information – including credentials and mobile numbers – from customers of several banks in India.Read more...
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
FireEye Cyber Defense Summit 2016: The Incident Response Track – Technical Details and Solutions that WorkNovember 16, 2016 1:16 PM By Chris DiGiamo | Threat Intelligence
What do you need to know about incident response? Whatever you need, you'll find it at the 2016 FireEye Cyber Defense Summit. From solutions and research to successes and experience, our experts will have the details you need.
November 9, 2016 8:00 AM By Alek Rollyson | Exploits
A look at IMA - Integrity Measurement Architecture - which can improve your visibility into Linux process execution and help you in find more evil in your network.Read more...
November 4, 2016 4:53 PM By Nick Harbour