Mandiant recently held the webinar From the Front Lines: The Industrial Evolution - Transforming Security for Critical Infrastructure, which focused on threats to Industrial Control System (ICS) and the challenges organizations are facing to secure these gaps and vulnerabilities. I caught-up with one of the presenters, Dan Scali, Manager, Industrial Control Systems, to further discuss ICS Security and what can be done to mitigate the risk to these systems.Read more...
Archive for 'November 2014'
Understanding the Importance of Industrial Control System Security, Interview with Dan Scali, Manager Industrial Control SystemsNovember 24, 2014 4:30 PM By Jennifer Bielski
November 30, 2014 11:18 PM By Kristen Dennesen, Barry Vengerik, Jonathan Wrolstad, Jordan Berry | Threat Intelligence
A group called FIN4 appears to be stealing insider information to obtain an edge on stock trading.
November 25, 2014 4:07 PM By Yulong Zhang, Tao Wei, Hui Xue | Exploits
November 21, 2014 2:36 PM By Ned Moran, Mike Oppenheim, Mike Scott, Joshua Homan
APT3 (also known as UPS), the actors responsible for Operation Clandestine Fox, has quietly continued to send waves of spearphishing messages over the past few months and has now focused on privilege escalation.Read more...
November 17, 2014 7:14 PM By Richard Wartell, Mike Sikorski
In July, the FireEye Labs Advanced Reverse Engineering (FLARE) team created and released the first FLARE On Challenge to the community. A total of 7,140 people participated and showed off their skills, and 226 people completed the challenge. Everyone who finished the challenge received a challenge coin to commemorate their success.Read more...
Operation Poisoned Handover: Unveiling Ties Between APT Activity in Hong Kong’s Pro-Democracy MovementNovember 3, 2014 8:00 AM By Ned Moran, Mike Oppenheim, Mike Scott | Threat Intelligence
As the pro-democracy movement in Hong Kong has continued, we’ve been watching for indications of confrontation taking place in cyberspace. Protests began in September and have continued to escalate.Read more...
November 3, 2014 8:05 AM By Tony Cole | Threat Intelligence
November 10, 2014 12:00 PM By Hui Xue, Yulong Zhang, Tao Wei | Mobile Threats, Vulnerabilities, Threat Intelligence, Exploits, Targeted Attack
November 11, 2014 11:00 AM By J. Gomez