Category: FireEye
Using Speakeasy Emulation Framework Programmatically to Unpack Malware
Andrew Davis recently announced the public release of his new Windows emulation framework named Speakeasy. While the introductory blog post focused on using Speakeasy as an automated malware sandbox of […]A Look Back and a Look Forward: Cyber Security in 2021
With 2020 coming to an end, we’ve released our 2021 cyber security predictions report, videos with our senior leaders and more. I asked Major General Earl Matthews, VP of Strategy […]FireEye Options for Symantec Customers
Customers of Symantec enterprise solutions continue to feel the impact of Broadcom’s acquisition. After Broadcom discontinued Symantec Endpoint Protection Cloud and Small Business Editions and sold off the cyber security […]Election Cyber Threats in the Asia-Pacific Region
In democratic societies, elections are the mechanism for choosing heads of state and policymakers. There are strong incentives for adversary nations to understand the intentions and preferences of the people […]FireEye is the Intelligent Choice for Symantec Replacement
Stop breaches in their tracks Each desktop, laptop and server is a possible entry for a breach, leaving your data, customer information and intellectual property at risk. Endpoint Security protects […]Purgalicious VBA: Macro Obfuscation With VBA Purging
Malicious Office documents remain a favorite technique for every type of threat actor, from red teamers to FIN groups to APTs. In this blog post, we will discuss “VBA Purging”, […]Find and Verify Threats in Splunk Phantom With FireEye Detection On Demand
Threats can and do come from everywhere, and every organization approaches security differently based on their needs, industry and environment. But the one thing organizations all have in common is […]A Global Reset: Cyber Security Predictions 2021
For most of us, 2020 was one of the most challenging years in recent memory. We struggled to deal with big changes in our personal lives and were forced to […]Ransomware: The Threat We Can No Longer Afford to Ignore
Cybercrime is a billion-dollar industry that is consistently evolving. Innovation is at the heart of these criminal acts—hackers and fraudsters must continuously overcome advances in technology and forensics, in addition […]Malicious File Transfer: What You Need To Know About an Attacker’s Methods and Techniques To Protect Your Organization From Malware
One of the most effective ways for threat actors to infiltrate a network’s defenses is through the use of malware. As I discussed in our Security Effectiveness Report: Malicious File Transfer video, […]Load More