Category: FireEye
APT41: A Dual Espionage and Cyber Crime Operation
Today, FireEye Intelligence is releasing a comprehensive report detailing APT41, a prolific Chinese cyber threat group that carries out state-sponsored espionage activity in parallel with financially motivated operations. APT41 is […]A “DFUR-ent” Perspective on Threat Modeling and Application Log Forensic Analysis
Many organizations operating in e-commerce, hospitality, healthcare, managed services, and other service industries rely on web applications. And buried within the application logs may be the potential discovery of fraudulent […]The Cost Factor: Taking a Proactive Approach to Cyber Security ROI
Security teams are doing their best to keep employees online and secure during this extended period of working from home, but as we move towards the end of the year, […]Under the Influence: A Look at Modern Day Information Operations
Information operations (IO) gained prominent public attention in 2016 during the U.S. general election. Since then, new campaigns have continued to be exposed, and the tactics that actors employ have […]Policy Evasion: Evasive Techniques You Need to Understand to Prevent Breaches and Attacks
Evasive techniques are regularly used by cyber attackers to avoid detection and hide malicious activity, and they are quite effective too. In our Mandiant Security Effectiveness Report 2020, we found that […]Emulation of Malicious Shellcode With Speakeasy
In order to enable emulation of malware samples at scale, we have developed the Speakeasy emulation framework. Speakeasy aims to make it as easy as possible for users who are […]A Hands-On Introduction to Mandiant’s Approach to OT Red Teaming
Operational technology (OT) asset owners have historically considered red teaming of OT and industrial control system (ICS) networks to be too risky due to the potential for disruptions or adverse […]How Strategic Intelligence Helps Organizations Make Sense of the Threat Landscape
The Strategic Analysis team at Mandiant Threat Intelligence examines hundreds of discrete data points from numerous sources, distilling trends from that raw information to identify the most important, common, and […]The FireEye Approach to Effective Cloud Security
Reports indicate that roughly 83% of workloads are in the cloud as of this year. That’s a lot of new real estate for attackers, and now is the perfect time […]How Secure Is Your Remote Work Infrastructure?
Most organizations couldn’t even conceive a completely remote workforce, but earlier this year the world experienced an unpredictable circumstance that forced professionals to take on a new form of “business […]Load More