Archive for 'October 2014'

    A Threatening Threat Map

    By Ali Mesdaq | Threat Intelligence
    FireEye recently released a ThreatMap to visualize some of our Threat Intelligence Data.The ThreatMap data is a sample of real data collected from our two-way sharing customers for the past 30 days. The data represented in the map is malware communication to command and control (C2) servers, where the "Attackers” represent the location of the C2 servers and "Targets" represent customers.To mask customer identity, locations are represented as the center of the Read more...


    Double-edged Sword: Australia Economic Partnerships Under Attack from China

    | Threat Intelligence

    Every day at Mandiant we respond to some of the largest cyber security incidents around the world. This gives us a front-row seat to witness what works (and what doesn't) when it comes to finding attackers and preventing them from stealing our clients' data.

    Read more...


    APT28: A Window into Russia's Cyber Espionage Operations?

    | Threat Intelligence
    The role of nation-state actors in cyber attacks was perhaps most widely revealed in February 2013 when Mandiant released the APT1 report, which detailed a professional cyber espionage group based in China. Today we release a new report: APT28: A Window Into Russia’s Cyber Espionage Operations? This report focuses on a threat group that we have designated as APT28. While APT28’s malware is fairly well known in the cybersecurity community, our report Read more...


    New Tactics. New Motives. New Services.

    By Jurgen Kutscher

    Every day at Mandiant we respond to some of the largest cyber security incidents around the world. This gives us a front-row seat to witness what works (and what doesn't) when it comes to finding attackers and preventing them from stealing our clients' data.

    Read more...


    MIRcon 2014 – Day 1 Highlights

    By Helena Brito

    The first day of MIRcon 2014 is officially done and was packed with thought-provoking keynotes, presentations and a one-of-a-kind reception. While there's too much to fit into this blog post, I wanted to provide you with some of the highlights:

    Read more...


    Q&A Webinar Follow-Up: Fresh Prints of Malware - Retail Therapy: An Analysis of Retail Breaches and Card Theft

    By Helena Brito

    As a follow-up to our recently held webinar Fresh Prints of Malware - Retail Therapy: An Analysis of Retail Breaches and Card Theft, questions answered by presenters Nick Pelletier and Manny Jean-Georges are listed below. To view the archived webinar, please click here.

    Read more...


    What are Java's Biggest Vulnerabilities?

    By Abhishek Singh | Vulnerabilities, Targeted Attack
    In our continuing mission to equip security professionals against today’s advanced cyber threats, FireEye has published a free technical report, “A Daily Grind: Filtering Java Vulnerabilities." The report outlines the three most commonly exploited Java vulnerabilities and maps out the step-by-step infection flow of exploits kits that leverage them.CVE-2012-0507: is due to the improper implementation of AtomicReferenceArray() leading to the type confusion vulnerability.CVE-2013-2465: which involves insufficient bounds checks in the storeImageArray() function. This vulnerability is Read more...

    An error has occurred

     

    Well that wasn’t supposed to happen. Something went wrong when trying to access this page. Please try again in a few minutes while we’re working on it.

    To send feedback about this error, click here.