Category: FireEye
Dissecting a NETWIRE Phishing Campaign’s Usage of Process Hollowing
Introduction Malware authors attempt to evade detection by executing their payload without having to write the executable file on the disk. One of the most commonly seen techniques of this "fileless" execution is code injection. Rather thanA Video Surveillance System for the Network – The Top Five Benefits of Network Forensics
It is no surprise that most home alarms are purchased after a break-in has occurred. Unfortunately, most businesses apply the same decision-making process to their own networks. The majority of network security spend is placed on preventativeCommando VM: The First of Its Kind Windows Offensive Distribution
For penetration testers looking for a stable and supported Linux testing platform, the industry agrees that Kali is the go-to platform. However, if you’d prefer to use Windows as an operating system, you may have noticed that a worthy platformWhat General Counsel Need to Do to Prepare for a Cyber Breach
General Counsel (GC) address myriad legal and business challenges, but none may be as harrowing as dealing with a cyber attack. Even before dealing with an incident, there is the stress of simply not knowing when a successful attack may occurOfficial Photo Gallery of RISK 2019
The largest IT security conference in SE Europe returned to Lasko on March 20th and 21st, where over 600 attendees thoroughly enjoyed the experience the organizers set up – view […]RISK 2019 – Cyber attack simulation by FireEye
On the first day of RISK 2019, the 20th of March 2019 from 13:00 until 14:00, a one hour Cyber attack simulation will take place, presented by Mandiant’s Principal Strategic […]RISK 2019 – Overview of FireEye upcoming workshops
At RISK 2019, FireEye’s Senior Sales Engineer Anca Holban will host three workshops, partly on the first and on the second day of the conference. Wednesday, March 20th 2019 at […]RISK 2019 – Cyber Threat Landscape: The View Behind the Scene – FireEye
At RISK 2019, FireEye Intelligence’s Principal Analyst, Luke McNamara will deliver a keynote titled “2019 Cyber Threat Landscape: The View Behind the Scene” on the first day of the event, […]FireEye ‘Endpoint’ rešitve imajo sedaj vgrajeno še strojno učenje
FireEye je pred nedavnim v rešitev za zaščito končnih sistemov FireEye Endpoint Security implementiral dodatno komponento oz. varnostni pogon (engine) MalwareGuard. MalwareGuard temelji na naprednih algoritmih strojnega učenja za obdelavo […]Load More