Category: FireEye
Unique Threats to Operational Technology and Cyber Physical Systems
In this latest episode of our Eye on Security podcast, I talk all about the world of operational technology (OT) and cyber physical systems with one of our foremost experts on […]9.0 Release for the Network Security Product Portfolio
FireEye is excited to announce the release of version 9.0 for our Network Security product portfolio that includes Network Security (NX), Central Manager (CM), Malware Analysis (AX), File Protect (FX) […]capa: Automatically Identify Malware Capabilities
capa is the FLARE team’s newest open-source tool for analyzing malicious programs. Our tool provides a framework for the community to encode, recognize, and share behaviors that we’ve seen in […]SCANdalous! (External Detection Using Network Scan Data and Automation)
Real Quick In case you’re thrown by that fantastic title, our lawyers made us change the name of this project so we wouldn’t get sued. SCANdalous—a.k.a. Scannah Montana a.k.a. Scanny […]The New Remote Workforce: Why Organizations Need Security Validation Now More Than Ever
The way we collectively live, work and play has drastically changed. As social distancing measures continue, the human and economic costs are becoming increasingly evident in many real and tangible […]Opening Doors: Supporting Women Leaders Through Our Partnership With Athena Alliance
Throughout my career, I was regularly the first and only woman in the room. As a junior law firm associate, I was often mistaken for an assistant and asked to […]Configuring a Windows Domain to Dynamically Analyze an Obfuscated Lateral Movement Tool
We recently encountered a large obfuscated malware sample that offered several interesting analysis challenges. It used virtualization that prevented us from producing a fully-deobfuscated memory dump for static analysis. Statically […]Cloud Security: Separating Fact From Fiction
Cloud technologies offer cost and efficiency benefits to organizations in every industry worldwide; however, inexperience in working with cloud solutions has led to numerous assumptions that place organizations at risk […]Sizing Up: How Mandiant Evaluates Ransomware Defense
Organizations across various regions, industries, and sectors have identified ransomware as a significant risk and wonder if they are positioned to successfully detect and prevent a ransomware attack. At FireEye […]Clouds Are Secure, Are You Using Them Securely?
Cloud technology isn’t new, but it’s still unfamiliar ground for many organizations. As if migrating to the cloud wasn’t already a massive undertaking, the added responsibility of integrating a comprehensive […]Load More