Category: FireEye
The Biggest Mistakes Made When Presenting Cyber Security to Senior Leadership or the Board, and How to Fix Them
The goal of communicating cyber security topics with senior executives and boards is to help them understand the top cyber security concerns, the impacts to the business and possible mitigation approaches so they can establish priorities andCmd and Conquer: De-DOSfuscation with flare-qdb
When Daniel Bohannon released his excellent DOSfuscation paper, I was fascinated to see how tricks I used as a systems engineer could help attackers evade detection. I didn’t have much to contribute to this conversation until I had to analyze aConference RISK 2019 coming for the first time to Bosnia and Herzegovina on October 8th 2019!
Reserve the date, as on October 8th 2019 the critically acclaimed information security conference RISK is coming to 5-star Hotel Hills Sarajevo in the capital city of Bosnia and Herzegovina! […]Test the best ATD for free! Start using FireEye Email Security today.
Reduce risk of cyber incidents, protect against known and evolving threats, detect and respond to exploits faster with FireEye Email Security! Every month, FireEye detects 280.000+ unique threat […]Not So Cozy: An Uncomfortable Examination of a Suspected APT29 Phishing Campaign
Introduction FireEye devices detected intrusion attempts against multiple industries, including think tank, law enforcement, media, U.S. military, imagery, transportation, pharmaceutical, national government, and defense contracting. TheObfuscated Command Line Detection Using Machine Learning
This blog post presents a machine learning (ML) approach to solving an emerging security problem: detecting obfuscated Windows command line invocations on endpoints. We start out with an introduction to this relatively new threat capability, andBypassing Network Restrictions Through RDP Tunneling
Remote Desktop Services is a component of Microsoft Windows that is used by various companies for the convenience it offers systems administrators, engineers and remote employees. On the other hand, Remote Desktop Services, and specifically theHigher Education Faces a Unique Cyber Threat Landscape
Data security remains a top priority among IT leaders in higher education. Yet according to the 2018 Campus Computing Survey, only 35 percent rate their security programs as "excellent." Colleges and universities face a unique threatDon’t Underestimate Credential Theft Malware
As 2018 came to a close, I stopped to reflect about the various threats we saw this year – particularly in Europe. While Europe continued to struggle with targeted attacks from organized cyber criminal groups and cyber espionage groups, thereBreaking the Bank: Weakness in Financial AI Applications
Currently, threat actors possess limited access to the technology required to conduct disruptive operations against financial artificial intelligence (AI) systems and the risk of this targeting type remains low. However, there is a high risk ofLoad More