Threat Intelligence Reports

Forrester: FireEye Named the Leader in External Threat Intelligence Services

Threat intelligence is one of the most overused terms in cyber security today. Every vendor promises their threat intelligence will solve your security challenges. This creates confusion in the marketplace and makes it challenging to evaluate threat intelligence offerings. 

To help organizations better understand threat intelligence service offerings, Forrester recently published their research report: The Forrester New Wave™: External Threat Intelligence Services, Q3 2018.

After evaluating 15 vendors on 10 criteria, Forrester found FireEye to be the leader:

  • "Leads the pack with its collection capabilities. The importance of iSight Partners and Mandiant cannot be overlooked when assessing FireEye’s threat intelligence capabilities, which marry digital forensics, human intelligence (HUMINT), and a global sensor network."
  • "Best fit for companies desiring a breadth of outcomes from a single vendor"
APT37 (REAPER) report cover

Cyber threat intelligence on advanced attack groups and technology vulnerabilities

FireEye regularly publishes cyber threat intelligence reports that describe the members of Advanced Persistent Threat (APT) groups, how they work and how to recognize their tactics, techniques and procedures. Cyber threat intelligence reports also cover vulnerabilities of specific business technologies, such as email, sandboxes and mobile devices. With access to such details cyber security experts can build better defenses against these APT groups and advanced cyber attacks.

APT37 (Reaper): The Overlooked North Korean Actor

Learn more about a suspected North Korean cyber espionage group that we now track as APT37 (Reaper).

Download report

APT28: At the center of the Russian cyber storm

Is the threat actor group, APT28, sponsored by the Russian government? Read about their decade-long cyber support of Russia's strategic interests, impacting the Syrian conflict, the 2016 U.S. presidential election and more.

Download report

Follow the Money: Dissecting the operations of the cyber crime group FIN6

Learn more about FIN6 threat group, their operations to steal payment card data and how they sell that information to an underground card shop.

Download report

Threat Intelligence: Independent Research

Threat Intelligence: Attack Groups

Threat Intelligence: Technologies