Hacker News
- Highly Evasive Attacker Leverages SolarWinds Supply Chain https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html 224 comments
- Using EMET to Disable EMET https://www.fireeye.com/blog/threat-research/2016/02/using_emet_to_disabl.html 7 comments
- FireEye Capa Now Supporting ELF https://www.fireeye.com/blog/threat-research/2021/09/elfant-in-the-room-capa-v3.html 2 comments reverseengineering
- Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With Sunburst Backdoor https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html 5 comments technology
- Live off the Land? How About Bringing Your Own Island? An Overview of UNC1945 https://www.fireeye.com/blog/threat-research/2020/11/live-off-the-land-an-overview-of-unc1945.html 5 comments netsec
- 404 Exploit Not Found: Vigilante Deploying Mitigation for Citrix NetScaler Vulnerability While Maintaining Backdoor https://www.fireeye.com/blog/threat-research/2020/01/vigilante-deploying-mitigation-for-citrix-netscaler-vulnerability-while-maintaining-backdoor.html 21 comments netsec
- Fireeye Introduces Commando VM: Windows Offensive VM https://www.fireeye.com/blog/threat-research/2019/03/commando-vm-windows-offensive-distribution.html 55 comments netsec
- Global DNS Hijacking Campaign: DNS Record Manipulation at Scale « Global DNS Hijacking Campaign: DNS Record Manipulation at Scale https://www.fireeye.com/blog/threat-research/2019/01/global-dns-hijacking-campaign-dns-record-manipulation-at-scale.html 7 comments netsec
- APT38: Details on New North Korean Regime-Backed Threat Group « APT38: Details on New North Korean Regime-Backed Threat Group https://www.fireeye.com/blog/threat-research/2018/10/apt38-details-on-new-north-korean-regime-backed-threat-group.html 8 comments netsec
- Increased Use of a Delphi Packer to Evade Malware Classification https://www.fireeye.com/blog/threat-research/2018/09/increased-use-of-delphi-packer-to-evade-malware-classification.html 5 comments netsec
- Fallout Exploit Kit Used in Malvertising Campaign to Deliver GandCrab Ransomware https://www.fireeye.com/blog/threat-research/2018/09/fallout-exploit-kit-used-in-malvertising-campaign-to-deliver-gandcrab-ransomware.html 3 comments netsec
- A Deep Dive Into RIG Exploit Kit Delivering Grobios Trojan https://www.fireeye.com/blog/threat-research/2018/05/deep-dive-into-rig-exploit-kit-delivering-grobios-trojan.html 3 comments netsec
- Rooting a Logitech Harmony Hub https://www.fireeye.com/blog/threat-research/2018/05/rooting-logitech-harmony-hub-improving-iot-security.html 10 comments netsec
- Attackers Deploy New ICS Attack Framework “TRITON” and Cause Operational Disruption to Critical Infrastructure https://www.fireeye.com/blog/threat-research/2017/12/attackers-deploy-new-ics-attack-framework-triton.html 34 comments netsec
- EPS Processing Zero-Days Exploited by Multiple Threat Actors https://www.fireeye.com/blog/threat-research/2017/05/eps-processing-zero-days.html 9 comments netsec
- APT29 Domain Fronting With TOR https://www.fireeye.com/blog/threat-research/2017/03/apt29_domain_frontin.html 5 comments netsec
- Microsoft's System Center Configuration Manager's (SCCM) software metering history, which can record the path, name, size, associated user name, last used time, launch count, and PE metadata of executed files. https://www.fireeye.com/blog/threat-research/2016/12/do_you_see_what_icc.html 3 comments sysadmin
- Microsoft's System Center Configuration Manager's (SCCM) software metering history, which can record the path, name, size, associated user name, last used time, launch count, and PE metadata of executed files. https://www.fireeye.com/blog/threat-research/2016/12/do_you_see_what_icc.html 4 comments netsec
- We have an open screen on our display wall. Anything fun to put on it? https://www.fireeye.com/cyber-map/threat-map.html 25 comments sysadmin
- CVE-2016-4117: Flash Zero-Day Exploited in the Wild https://www.fireeye.com/blog/threat-research/2016/05/cve-2016-4117-flash-zero-day.html 50 comments netsec
- Using EMET to Disable EMET https://www.fireeye.com/blog/threat-research/2016/02/using_emet_to_disabl.html 6 comments netsec
- Another active malware family has been spotted targeting Android. https://www.fireeye.com/blog/threat-research/2015/10/kemoge_another_mobi.html 69 comments netsec
- Public Announcement: Researchers find tons of Cisco routers with malicious firmware called SYNful Knock. This is the type of attack that can only be orchestrated by nation states. NSA/GCHQ/Israel prime suspects. https://www.fireeye.com/blog/threat-research/2015/09/synful_knock_-_acis.html 27 comments privacy
- SYNful Knock - A Cisco router implant - Part 1 https://www.fireeye.com/blog/threat-research/2015/09/synful_knock_-_acis.html 13 comments netsec
- Operation Clandestine Wolf – Adobe Flash Zero-Day in APT3 Phishing Campaign https://www.fireeye.com/blog/threat-research/2015/06/operation-clandestine-wolf-adobe-flash-zero-day.html 13 comments netsec
- Russia use unpatched CVE-2015-1701 in highly-targeted attack https://www.fireeye.com/blog/threat-research/2015/04/probable_apt28_useo.html 4 comments microsoft
- Flash in 2015 https://www.fireeye.com/blog/threat-research/2015/03/flash_in_2015.html 39 comments netsec
- Saw this on Sixty Minutes, not sure if this is Really pulling in Real time information https://www.fireeye.com/cyber-map/threat-map.html 8 comments webdev
- Apple iOS bug makes devices vulnerable to phishing attack that can result in replacing genuine apps with fake ones http://www.fireeye.com/blog/technical/cyber-exploits/2014/11/masque-attack-all-your-ios-apps-belong-to-us.html 6 comments technology
- New report says the Russian government may be deploying malware to gather intelligence on governments, militaries, and other security organizations http://www.fireeye.com/blog/technical/2014/10/apt28-a-window-into-russias-cyber-espionage-operations.html 4 comments worldnews
- APT28 - Russian attacks http://www.fireeye.com/resources/pdfs/apt28.pdf 6 comments netsec
- FireEye discovers two new Windows exploits in the wild http://www.fireeye.com/blog/technical/targeted-attack/2014/10/two-targeted-attacks-two-new-zero-days.html 22 comments netsec
- FireEye reports on shellshock attacks in the wild going on right now. http://www.fireeye.com/blog/uncategorized/2014/09/shellshock-in-the-wild.html 4 comments sysadmin
- FireEye and Fox IT recover private Cryptolocker keys and offer them free of charge to affected users. http://www.fireeye.com/blog/corporate/2014/08/your-locker-of-information-for-cryptolocker-decryption.html 3 comments technology
- FireEye and Fox IT Provide Online Service to Help Decrypt Cryptolocker Encrypted Files http://www.fireeye.com/blog/corporate/2014/08/your-locker-of-information-for-cryptolocker-decryption.html 4 comments netsec
- Evidence Linking Hacker Group to Iran Shows Increasing Sophistication in Attacks Targeting U.S. Defense Organizations and Iranian Dissidents http://www.fireeye.com/resources/pdfs/fireeye-operation-saffron-rose.pdf 19 comments netsec
- New Zero-Day Exploit targeting Internet Explorer Versions 9 through 11 Identified in Targeted Attacks http://www.fireeye.com/blog/uncategorized/2014/04/new-zero-day-exploit-targeting-internet-explorer-versions-9-through-11-identified-in-targeted-attacks.html 66 comments netsec
- Background Monitoring on Non-Jailbroken iOS 7 Devices — and a Mitigation http://www.fireeye.com/blog/technical/2014/02/background-monitoring-on-non-jailbroken-ios-7-devices-and-a-mitigation.html 4 comments apple
- FireEye:New IE Zero-Day Found in Watering Hole Attack (2014-02-13) http://www.fireeye.com/blog/technical/cyber-exploits/2014/02/new-ie-zero-day-found-in-watering-hole-attack-2.html 5 comments netsec
- Darkleech Says Hello - FireEye serving up drive-by http://www.fireeye.com/blog/technical/cyber-exploits/2013/09/darkleech-says-hello.html 3 comments netsec