Archive for 'September 2013'
September 6, 2013 4:00 AM By Nart Villeneuve, Ned Moran, Thoufique Haq
September 30, 2013 4:19 PM By Ned Moran, Nart Villeneuve
September 21, 2013 1:10 PM By Ned Moran, Nart Villeneuve
September 11, 2013 5:10 PM By Amit Malik
September 22, 2013 2:07 AM By Dan Caselden, Xiaobo Chen
In our previous blog post my colleagues Ned and Nart provided a detailed analysis on the Advanced Persistent Threat (APT) Campaign Operation DeputyDog. The campaign leveraged a zero-day vulnerability of Microsoft Internet Explorer (CVE-2013-3893). Microsoft provided an advisory and ‘Fix it’ blog post.Read more...
September 24, 2013 2:43 PM By Thoufique Haq, Ned Moran
September 10, 2013 9:18 PM By Helena Brito
Happy fall, everyone! I hope you're enjoying all the best that autumn offers - beautiful days, cooler nights, seasonal beverages and the promise of sweater weather . . .Read more...
September 5, 2013 8:08 PM By Chuck Willis
September 17, 2013 7:36 PM By Doug Wilson
With the buzz in the security industry this year about sharing threat intelligence, it's easy to get caught up in the hype, and believe that proper, effective sharing of Indicators or Intelligence is something that can just be purchased along with goods or services from any security vendor.Read more...
September 18, 2013 9:11 PM By Ted Wilson
With the recent integration of Mandiant Web Historian™ into Mandiant Redline™, you may be asking "How do I review my Web History using Redline?" If so, then follow along as I explain how to collect and review web history data in Redline - with a focus on areas where the workflow and features differ from that of Web Historian.Read more...
September 26, 2013 7:16 PM By Helena Brito
The information and views set out in these responses are those of the respondents and do not necessarily reflect the official opinion of Mandiant Corporation.Read more...
September 11, 2013 3:30 PM By Helena Brito
September 12, 2013 3:33 PM By Will Gibb
Over the next few months, a few of my colleagues and I will be touching on various topics related to Mandiant and computer security. As part of this series, we are going to be talking about OpenIOC - how we got where we are today, how to make and use IOCs, and the future of OpenIOC. This topic can't be rolled into a single blog post, so we have developed a brief syllabus to outline the topics that we will be covering in the near future.Read more...
September 23, 2013 7:38 PM By Intel Team
In the second quarter of 2013, Mandiant observed different types of threat activity across 26 industries--both as part of incidents we responded to and through external sources. The financial services industry and media & entertainment companies topped the list of most targeted sectors:Read more...
September 10, 2013 4:00 AM By Vinay Pidathala
September 30, 2013 4:00 AM By Kenneth Geers