Cyber Threat Intelligence Reports

red line drawn: China recalculates its use of cyber espionage

The September 25, 2015 agreement between President Barack Obama and Chinese Presisent Xi Jinping stated neither government would "conduct or knowingly support cyber-enabled theft of intellectual propery" for economic advantage. Since September 2015, FireEye has observed 13 active China-based groups conduct multiple instances of network compromise against corporations in the U.S., Europe and Japan. 

Download the report to learn about: 

  • Key findings that the FireEye iSIGHT Intelligence team uncovered
  • Factors such as indictments and sanctions that influence Chinese cyber operations
  • Observed changes in Chinese cyber operations and how they revamp their approaches

CYBER Threat Intelligence on Advanced Attack Groups and Technology Vulnerabilities

FireEye regularly publishes cyber threat intelligence reports that describe the members of advanced persistent threat (APT) groups, how they work and how to recognize their tools, tactics, and procedures. Cyber threat intelligence reports also cover vulnerabilities of specific business technologies, such as email, sandboxes and mobile devices. With access to such details cyber security experts can build better defenses against these APT groups and advanced cyber attacks.

Follow the Money: Dissecting the Operations of the Cyber Crime Group FIN6

Learn more about FIN6 threat group, their operations to steal payment card data and how they sell that information to an underground card shop.

Download Report

Connected Cars: The Open Road for Hackers

With most modern vehicle functions being controlled by software, automobiles could become a prime target for attackers with malicious intent. Find out the top 5 risks posed to interior and exterior vehicle systems.

Download Report

Pinpointing Targets: Exploiting Web Analytics to Ensnare Victims

Cyber threat intelligence on how attackers alter websites and redirect visitors to a profiling script called WITCHCOVEN.

Download Report

Threat Intelligence: Independent Research


Threat Intelligence: Attack Groups

Threat Intelligence: Technologies