Threat Intelligence Reports

Six subversive security concerns for industrial environments

Industrial enterprises – like electric utilities, petroleum companies, and manufacturing organizations – invest heavily in industrial control systems (ICS) to operate industrial processes efficiently, reliably, and safely. Without technology operating the plant floor, business halts or worse.

Learn about six key plant floor weaknesses that adversaries exploit to undermine plant operations. Subversive and difficult to detect, get a step-by-step checklist for mitigating risks associated with these rarely-recognized vulnerabilities.

subversive 6 report cover

Cyber threat intelligence on advanced attack groups and technology vulnerabilities

FireEye regularly publishes cyber threat intelligence reports that describe the members of Advanced Persistent Threat (APT) groups, how they work and how to recognize their tactics, techniques and procedures. Cyber threat intelligence reports also cover vulnerabilities of specific business technologies, such as email, sandboxes and mobile devices. With access to such details cyber security experts can build better defenses against these APT groups and advanced cyber attacks.

FIN10: Anatomy of a Cyber Extortion Operation

A set of financially motivated intrusion operations being carried out by an actor dubbed FIN10 are targeting casinos and mining organizations in North America (with a focus on Canada).

Download report

APT28: At the center of the Russian cyber storm

Is the threat actor group, APT28, sponsored by the Russian government? Read about their decade-long cyber support of Russia's strategic interests, impacting the Syrian conflict, the 2016 U.S. presidential election and more.

Download report

Follow the Money: Dissecting the operations of the cyber crime group FIN6

Learn more about FIN6 threat group, their operations to steal payment card data and how they sell that information to an underground card shop.

Download report

Threat Intelligence: Independent Research

Threat Intelligence: Attack Groups

Threat Intelligence: Technologies