FireEye | xxxFireEye – xxx
菜单

FireEye

Fighting Supply Chain Threats Is Complicated
Relying on the kindness of strangers is not an ideal st […]
Zero Care About Zero Days
The time to repurpose vulnerabilities into working expl […]
Go Go Gadget Alerts! FireEye Helix utilizes data from Amazon Inspector for Investigations
"Dr. Claw and M.A.D. Cat have started their cyber […]
Cloud API Services, Apps and Containers Will Be Targeted in 2022
McAfee Enterprise and FireEye recently teamed to releas […]
‘Tis The Season for Holiday Cyber Threats Targeting Enterprises in a Pandemic World
The holiday season is upon us, and many are preparing t […]
Who Will Bend the Knee in RaaS Game of Thrones in 2022
McAfee Enterprise and FireEye recently released its 202 […]
Nation States Will Weaponize Social and Recruit Bad Guys with Benefits in 2022
McAfee Enterprise and FireEye recently released its 202 […]
Limited Shifts in the Cyber Threat Landscape Driven by COVID-19
Though COVID-19 has had enormous effects on our society and economy, its effects on the cyber threat landscape remain limited. For the most part, the same [...]
XDR: Making an Impact on the SOC
With organizations struggling with alert fatigue and di […]
A Global Reset: Cyber Security Predictions 2021
For most of us, 2020 was one of the most challenging ye […]
Road to Predictions: A Discussion About 2021 With FireEye and Mandiant Experts
When planning Cyber Summit 2020, we thought it would be […]
Late Game and Lingering Threats to the Upcoming Elections
As the U.S. elections near an end, the nature of succes […]
The Cost Factor: Taking a Proactive Approach to Cyber Security ROI
Security teams are doing their best to keep employees o […]
Europe’s New Sanction Regime Suggests a Growing Cyber Diplomacy Presence
For the first time in its history, the European Union ( […]
McAfee Enterprise and FireEye 2022 Threat Predictions
What cyber security threats should enterprises look out […]
Shaping the Future of Cybersecurity
Today marks a significant and exciting step forward for […]
Rising to the Challenge
In June, Symphony Technology Group (STG) announced its […]
FireEye Network Security 9.1 Release is the Biggest Yet
In the pilot episode of the Apple TV+ show Ted Lasso, a […]
On a Mission: A Rapidly Deployable Multi-Domain Solution
Government security teams often do not know what type o […]
ELFant in the Room – capa v3
Since our initial public release of capa, incident responders and reverse engineers have used the tool to automatically identify capabilities in [...]
Through the Analyst Lens: The Real Power of Managed Detection and Response Services
The constant threat of data breach has organizations sc […]
Pro-PRC Influence Campaign Expands to Dozens of Social Media Platforms, Websites, and Forums in at Least Seven Languages, Attempted to Physically Mobilize Protesters in the U.S.
In June 2019, Mandiant Threat Intelligence first reported to customers a pro-People’s Republic of China (PRC) network of hundreds of inauthentic accounts [...]
The Evolving Ransomware Landscape
In this episode of Eye on Security we dive into a secur […]
PST, Want a Shell? ProxyShell Exploiting Microsoft Exchange Servers
In August 2021, Mandiant Managed Defense identified and responded to the exploitation of a chain of vulnerabilities known as ProxyShell. The ProxyShell [...]
Too Log; Didn’t Read — Unknown Actor Using CLFS Log Files for Stealth
The Mandiant Advanced Practices team recently discovered a new malware family we have named PRIVATELOG and its installer, STASHLOG. In this post, we will [...]
FireEye Email Security—Cloud Edition Now Offers Native Integration With Microsoft 365 (and More)
Email remains the number one attack vector today and, a […]
Tackling Supply Chain Security
Whether it is shipping disruptions caused by the COVID- […]
FireEye Recognized as a Leader in U.S. Managed Detection and Response Services
Every couple of years the security threat landscape is […]
Detecting Embedded Content in OOXML Documents
On Advanced Practices, we are always looking for new ways to find malicious activity and track adversaries over time. Today we’re sharing a technique we [...]
Mandiant Discloses Critical Vulnerability Affecting Millions of IoT Devices
Today, Mandiant disclosed a critical risk vulnerability in coordination with the Cybersecurity and Infrastructure Security Agency (“CISA”) that affects [...]
Introducing FireEye Extended Detection and Response (XDR): A Flexible XDR Solution Born From the Front Lines of Threat Detection and Response
There is something inspiring about a large team coming […]
Cloudvisory 5.0 Release Brings Cloud Native Infrastructure Scanning, IAM Tools and More
We are excited to share some great new time and sanity […]
Announcing the Eighth Annual Flare-On Challenge
The FLARE team is once again hosting its annual Flare-On challenge, now in its eighth year. Take this opportunity to enjoy some extreme social distancing [...]
An Intriguing Update to Mandiant Advantage
Today Mandiant made a significant announcement in furth […]
UNC215: Spotlight on a Chinese Espionage Campaign in Israel
This blog post details the post-compromise tradecraft and operational tactics, techniques, and procedures (TTPs) of a Chinese espionage group we track as [...]
Clear Directive: Executive Order Adds Urgency to Zero Trust Adoption
The Biden Administration’s recent cyber security Execut […]
Mandiant Saves Multi-Brand Restaurant Company Millions of Dollars by Avoiding Ransomware
Every IT security professional knows what it’s like to […]
capa 2.0: Better, Faster, Stronger
We are excited to announce version 2.0 of our open-source tool called capa. capa automatically identifies capabilities in programs using an extensible rule [...]
Fostering CTI Development With Mandiant Intelligence Services
In this episode of Eye on Security, I am joined by Jeff […]
Sharing is Caring: FireEye Helix Connects to Netskope to Block Threats
FireEye Helix is a SaaS security operations platform th […]
Low Sophistication Threat Actors Continue to Target OT
In this episode of Eye on Security, I had Daniel Kapell […]
Visualizing FireEye Endpoint Security Host Management Data With Google Data Studio
The Host Management module for FireEye Endpoint Securit […]
Smoking Out a DARKSIDE Affiliate’s Supply Chain Software Compromise
Mandiant observed DARKSIDE affiliate UNC2465 accessing at least one victim through a Trojanized software installer downloaded from a legitimate website. [...]
Top Cyber Threats to Latin America and the Caribbean
Cyber threat activity affects governments, businesses, […]
Lighten the Load With XDR for Better Threat Detection
Alert fatigue is real. Think about this: How much time […]
Re-Checking Your Pulse: Updates on Chinese APT Actors Compromising Pulse Secure VPN Devices
On April 20, 2021, Mandiant published detailed results of our investigations into compromised Pulse Secure devices by suspected Chinese espionage [...]
Pandemic Impacts to the Cyber Threat Landscape
In the latest episode of Eye on Security, I had Jens Mo […]
Can You Prove Your Next Cyber Investment Addresses the Most Risk?
A large majority (87%) of security leaders say their or […]
Crimes of Opportunity: Increasing Frequency of Low Sophistication Operational Technology Compromises
Attacks on control processes supported by operational technology (OT) are often perceived as necessarily complex. This is because disrupting or modifying a [...]
The "Big Four": Spotlight on Russia
We are wrapping up our "Big Four" series with […]

Notice: Undefined variable: canUpdate in /var/www/html/wordpress/wp-content/plugins/wp-autopost-pro/wp-autopost-function.php on line 51