Fireeye - blog.fireeye.com

General Information:

Latest News:

Security Consolidation: Leveraging Business Intelligence 26 Aug 2013 | 08:17 pm

With business intelligence moving to the top of the priority stack followed by updating legacy systems, we must wonder when the same forward looking view will be applied to security strategies. All to...

Operation Molerats: Middle East Cyber Attacks Using Poison Ivy 23 Aug 2013 | 01:00 pm

Don’t be too hasty to link every Poison Ivy-based cyber attack to China. The popular remote access tool (RAT), which we recently detailed on this blog, is being used in a broad campaign of attacks lau...

Poison Ivy: Assessing Damage and Extracting Intelligence 21 Aug 2013 | 01:00 pm

Today, our research team is publishing a report on the Poison Ivy family of remote access tools (RATs) along with a package of tools created to work as a balm of sorts — naturally, we’re calling the p...

Android Malware: Why Aren’t We Doing Something About It? 20 Aug 2013 | 11:39 pm

It seems only a couple of years ago that we were talking about breaking the 1,000 mark in malicious android apps and now we move closer to the million mark according to these DEF CON researchers. The ...

The Sunshop Campaign Continues 19 Aug 2013 | 11:38 pm

We recently detected what we believe is a continuation of the Sunshop campaign that we first revealed on May 20, 2013. This follow-on to the Sunshop campaign started on July 17, 2013. In this latest ...

Cyber Insurance – the Chicken and the Egg 17 Aug 2013 | 12:06 am

Today, one of the most common discussions I have is “How do I qualify the cyber security risk to my board?” The security industry is very good at being able to define the type and scale of threats act...

Survival of the Fittest: New York Times Attackers Evolve Quickly 12 Aug 2013 | 01:00 pm

The attackers behind the breach of the New York Times’ computer network late last year appear to be mounting fresh assaults that leverage new and improved versions of malware. The new campaigns mark ...

Breaking Down the China Chopper Web Shell – Part II 9 Aug 2013 | 01:00 pm

Part II in a two-part series. Read Part I. Introduction In Part I of this series, I described China Chopper’s easy-to-use interface and advanced features — all the more remarkable considering the We...

Breaking Down the China Chopper Web Shell – Part I 7 Aug 2013 | 01:00 pm

Part I in a two-part series. China Chopper: The Little Malware That Could China Chopper is a slick little web shell that does not get enough exposure and credit for its stealth. Other than a good bl...

The Curious Case of Encoded VB Scripts : APT.NineBlog 6 Aug 2013 | 01:21 am

We came across a rather peculiar TTP (Tools, Techniques, and Procedures) in a targeted attack we found recently. This targeted attack uses simpler techniques but still remains effective in infiltratin...

Related Keywords:

noc4hosts, Fireeye, fire eye, fire eyes, fire eye technology, fireeye inc, fire eye inc, fireeyes network, fireeye appliance

Recently parsed news:

Recent searches: