Cyber Threat Intelligence Reports

Critical Lessons from 15 Years of Industrial Control Systems Vulnerabilities

Industrial Control Systems (ICS) allow operators to monitor and control crucial industrial and physical processes used in the oil and gas, energy, water, manufacturing, transportation, and chemical industries. Compromises to these critical infrastructures would be highly disruptive and cause significant harm to consumers, businesses, governments and organizations.

The FireEye threat intelligence team has compiled a report that analyzes over 15 years of research covering 1,552 publicly available ICS vulnerability disclosures and reveals the following:

  • 49% increase in the number of ICS disclosures from 2014 to 2015. 
  • 33% of ICS vulnerabilities were zero-day vulnerabilities. 
  • 58% of ICS disclosures affect products at Level 2 according to the Purdue ICS architectural model. 

Download this special report to get more details, including trends in total ICS vulnerability disclosure and outlook and recommendations for ICS asset owners.

ISC Vulnerability Trend Report

CYBER Threat Intelligence on Advanced Attack Groups and Technology Vulnerabilities

FireEye regularly publishes cyber threat intelligence reports that describe the members of advanced persistent threat (APT) groups, how they work and how to recognize their tools, tactics, and procedures. Cyber threat intelligence reports also cover vulnerabilities of specific business technologies, such as email, sandboxes and mobile devices. With access to such details cyber security experts can build better defenses against these APT groups and advanced cyber attacks.

Red Line Drawn: China Recalculates Its Use of Cyber Espionage

Based on analyses of 262 intrusions in 26 countries, read about the reasons behind the shifting tactics of China-based threat actors and how they might operate going forward.

Download Report

Follow the Money: Dissecting the Operations of the Cyber Crime Group FIN6

Learn more about FIN6 threat group, their operations to steal payment card data and how they sell that information to an underground card shop.

Download Report

Vendetta Brothers, Inc.: The Business of the Cybercriminal Underground

Learn how an enterprising duo of cybercriminals use business-like strategies to compromise point-of-sale (POS) systems, steal payment card information and sell it on their underground marketplace, “Vendetta World.”

Download Report


Threat Intelligence: Independent Research

 


Threat Intelligence: Attack Groups

Threat Intelligence: Technologies