Category: Trellix
Unified SaaS Application Security, Detection, and Response
Organizations are rapidly embracing Software as a Service (SaaS) applications for scalability, ease & flexibility of use, and the benefits of not using their own infrastructure. To maintain their focus […]Unpacking the CVEs in the FireEye Breach – Start Here First
In a blog post on Dec. 22, 2020, Qualys revealed it has identified 7.5 million instances of vulnerability to the stolen FireEye Red Team assessment tools across an anonymized set of its […]Excelerating Analysis – Tips and Tricks to Analyze Data with Microsoft Excel
Incident response investigations don’t always involve standard host-based artifacts with fully developed parsing and analysis tools. At FireEye Mandiant, we frequently encounter incidents that involve a number of systems and […]Leveraging Smart Launcher to Evade the Evaders
Smart Launcher is a technology designed by FireEye to rapidly upgrade and modify the FireEye MVX sandbox technology used in our Network Security and Email Security solutions. Smart Launcher enables […]Technical Deep Dive Into SolarWinds Breach
Many organizations have been compromised by the recent SolarWinds breach, which seems to be a targeted attack against both government and private agencies. The complete scale of this attack is […]Welcome to the Unbound Enterprise
Understanding the Need for the Unbound Enterprise Unbound Work Requires Unbound Security Getting to unbound depends on a corporate leadership open to the change of moving traditional software to the […]Know More about the Impact of the SolarWinds Breach on your Environment with ThreatQ
Know More about the Impact of the SolarWinds Breach on your Environment with ThreatQ ROSS HAMMER With the recent compromise announcement from SolarWinds and FireEye, a lot of information and […]Direct Access to Threat Intelligence With Mandiant Advantage
Our customers and partners have been asking for an easier way to stay informed of threat intelligence announcements. To address this need, earlier this year we launched Mandiant Advantage, our […]DebUNCing Attribution: How Mandiant Tracks Uncategorized Threat Actors
Many people are hearing the term UNC for the first time after we published details of a threat group we refer to as UNC2452. “UNC” groups—or “uncategorized” groups—are raw attribution […]Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor
Executive Summary We have discovered a global intrusion campaign. We are tracking the actors behind this campaign as UNC2452. FireEye discovered a supply chain attack trojanizing SolarWinds Orion business software […]Load More