Category: FireEye
Three Ways to Fortify Security Operations With Technology and Expertise
Information security practitioners operate in a multi-dimensional field requiring speed and agility in order to adapt to constant change. We must be swift at detection and response in order to […]Visibility, Compliance and Enforcement: A New Way to Take Control
Federal agencies are increasingly shifting workloads to the cloud to take advantage of cost efficiencies and agility, leaving them in a hybrid and multi-cloud environment. No matter where federal agencies […]Clouds Are Great, Secure Clouds Are the Greatest
The cloud continues to expand, from consumer life to business operations. Many of us seamlessly crossover apps such as music streaming, file sharing, instant messaging, video conferencing and maybe even […]The Security and Privacy Implications of COVID-19 Location Data Apps
Researchers around the world are rushing to create vaccines and medicines that can stop the COVID-19 pandemic or at least halt its spread. In the midst of these efforts, there […]Saluting the Heroes Among Us
Here at FireEye, we often talk about heroes—from the heroes on the front lines of today’s cyber security battles to the heroes who are pioneering new leadership opportunities for women. […]Using Real-Time Events in Investigations
To understand what a threat actor did on a Windows system, analysts often turn to the tried and true sources of historical endpoint artifacts such as the Master File Table […]Analyzing Dark Crystal RAT, a C# backdoor
The FireEye Mandiant Threat Intelligence Team helps protect our customers by tracking cyber attackers and the malware they use. The FLARE Team helps augment our threat intelligence by reverse engineering […]Does Your Security Strategy Effectively Protect Your Agency?
Cloud and mobile technologies have made it easier and more cost-effective for federal agencies to quickly deliver on critical missions. Yet, because these solutions are being used with greater frequency, […]Navigating the MAZE: Tactics, Techniques and Procedures Associated With MAZE Ransomware Incidents
Targeted ransomware incidents have brought a threat of disruptive and destructive attacks to organizations across industries and geographies. FireEye Mandiant Threat Intelligence has previously documented this threat in our investigations […]Majority of Attacks Successfully Infiltrate Without Detection and More in Mandiant Security Effectiveness Report 2020
Organizations have been managing security based on assumptions and best guesses for decades. However, these assumptions have resulted for many in financial and operational inefficiencies, defensive regression and an inability […]Load More