Category: FireEye
A Look Back and a Look Forward: Cyber Security in 2021
With 2020 coming to an end, we’ve released our 2021 cyber security predictions report, videos with our senior leaders and more. I asked Major General Earl Matthews, VP of Strategy for Mandiant Security Validation, to join me on Eye on SecurityFireEye Options for Symantec Customers
Customers of Symantec enterprise solutions continue to feel the impact of Broadcom’s acquisition. After Broadcom discontinued Symantec Endpoint Protection Cloud and Small Business Editions and sold off the cyber security services group, manyElection Cyber Threats in the Asia-Pacific Region
In democratic societies, elections are the mechanism for choosing heads of state and policymakers. There are strong incentives for adversary nations to understand the intentions and preferences of the people and parties that will shape aFireEye is the Intelligent Choice for Symantec Replacement
Stop breaches in their tracks Each desktop, laptop and server is a possible entry for a breach, leaving your data, customer information and intellectual property at risk. Endpoint Security protects your organization with intelligence ledPurgalicious VBA: Macro Obfuscation With VBA Purging
Malicious Office documents remain a favorite technique for every type of threat actor, from red teamers to FIN groups to APTs. In this blog post, we will discuss “VBA Purging”, a technique we have increasingly observed in the wildFind and Verify Threats in Splunk Phantom With FireEye Detection On Demand
Threats can and do come from everywhere, and every organization approaches security differently based on their needs, industry and environment. But the one thing organizations all have in common is the need for an intelligence-backed, validatedA Global Reset: Cyber Security Predictions 2021
For most of us, 2020 was one of the most challenging years in recent memory. We struggled to deal with big changes in our personal lives and were forced to overcome various obstacles in our professional lives. Now that the year is coming to aRansomware: The Threat We Can No Longer Afford to Ignore
Cybercrime is a billion-dollar industry that is consistently evolving. Innovation is at the heart of these criminal acts—hackers and fraudsters must continuously overcome advances in technology and forensics, in addition to staying ahead of lawMalicious File Transfer: What You Need To Know About an Attacker’s Methods and Techniques To Protect Your Organization From Malware
One of the most effective ways for threat actors to infiltrate a network’s defenses is through the use of malware. As I discussed in our Security Effectiveness Report: Malicious File Transfer video, there are a few main ways that malware entersLive off the Land? How About Bringing Your Own Island? An Overview of UNC1945
Through Mandiant investigation of intrusions, the FLARE Advanced Practices team observed a group we track as UNC1945 compromise managed service providers and operate against a tailored set of targets within the financial and professionalLoad More