Archive for 'March 2013'

    Internet Explorer 8 Exploit Found in Watering Hole Campaign Targeting Chinese Dissidents

    By Thoufique Haq, Yasir Khalid
    On  March 16th, we discovered a premeditated waterhole campaign that hosts exploits and malware on websites frequented by a specific target group. In this case the target includes Chinese dissidents.  For the attacker, this approach is highly attractive since it is very difficult to discover the attacker’s identity. Moreover, this attack is a form of social engineering, leveraging the fact that the target group visits specific websites. By exploiting these “watering holes” Read more...


    Redline: Answering Your Questions

    By Ted Wilson

    Those of you who attended the "Tools of Engagement: Redline™ - We've Got the Tool, If You've Got the Time" webinar last month by David Ross and myself will recall that we ran short on time while answering all of your questions. The webinar covered the latest updates to Redline, Mandiant's free tool for investigating hosts for signs of malicious activity through memory and file analysis, and subsequently developing a threat assessment profile.

    Read more...


    Women in Cybersecurity: Stephanie Scheuermann, Senior Security & Control Engineer at Ford Motor Company

    By Helena Brito

    As our regular readers know, we are celebrating National Women's History Month on the M-Unition blog featuring women that are passionate about their careers in security. Featured this month, we've sat down with Kristen Vanderame, CEO of Pondera, Halvar Flake and Carrie Jung, to discuss a women-only reverse engineering competition and now Stephanie Scheuermann of Ford Motor Company. These are women that are embracing technology to make a difference in the world of cybersecurity.

    Read more...


    Women in Cybersecurity: Kristen Verderame, CEO of Pondera International

    By Helena Brito

    March is National Women's History Month, and at Mandiant we know that this is a time to pay tribute to the innovations and contributions of women throughout history that have made a difference in our society. And more importantly for us, we want to recognize the women of today that are embracing technology to make a difference in the world of cybersecurity.

    Read more...


    Women in Cybersecurity: Karen Zwolski, VP of IT Security at URS Corporation

    By Helena Brito

    As part of our series celebrating National Women's History Month, we've been interviewing women who are making a difference in the world of security. Earlier this month we spoke with CEO of Pondera International, Kristen Vanderame; Halvar Flake and Carrie Jung, who discussed their women-only reverse engineering competition and Stephanie Scheuermann of Ford Motor Company. Today, we sit down with Vice President of IT Security at URS Corporation, Karen Zwolski; who says that what drives her is the opportunity to make a difference and feel like she has contributed to the success of her company.

    Read more...


    M-Unition Celebrates Women in Cybersecurity

    By Helena Brito

    Welcome to March, everyone! This month, in keeping with Women's History Month, M-Unition will be focusing on Women in Cybersecurity - highlighting the great work that women are doing in cybersecurity, on the front lines of efforts to combat advanced attackers.

    Read more...


    Mandiant APT1 Report Appendix F Update: SSL Certificate Hashes

    By Intel Team

    The following are MD5 and SHA1 hashes for the DER encoded SSL certificates released in Appendix F of the recent Mandiant APT1 report. We are releasing these to aid network detection of APT1 SSL-encrypted malware traffic.

    Read more...


    Interview with Halvar Flake & Carrie Jung on the Reverse Engineering Challenge for Women

    By Helena Brito

    As cybersecurity becomes more well-known outside our industry, the hope is to draw top talent to some of the most interesting careers within the field, such as reverse engineering. Unfortunately, there is still a large imbalance between men and women in cybersecurity; especially when it comes to highly technical positions.

    Read more...


    Why the C-Suite Should Care About Threat Intelligence

    By Grady Summers

    At the RSA USA 2013 Conference I overheard an attendee remark that threat intelligence was "the latest fad in the security industry." The person further commented that security fundamentals were, and always will be, the only thing that really matters.

    Read more...


    The Dingo and the Baby

    By Shray Kapoor, Vinay Pidathala
    SUMMARY: FireEye has been tracking an APT campaign for a while and we have noticed that this attack is currently active and targeting companies.In this case, the campaign An error has occurred | FireEye

    An error has occurred

     

    Well that wasn’t supposed to happen. Something went wrong when trying to access this page. Please try again in a few minutes while we’re working on it.

    To send feedback about this error, click here.