Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

fireeye.com

Threat Research Blog

Get the latest updates from Threat Research Blog directly as they happen.

Follow now 262 followers

Latest posts

Last updated about 11 hours ago

Unhappy Hour Special: KEGTAP and SINGLEMALT With a Ransomware Chaser

about 14 hours ago

Throughout 2020, ransomware activity has become increasingly prolific, relying on an ecosystem...

Welcome to ThreatPursuit VM: A Threat Intelligence and Hunting Virtual Machine

about 20 hours ago

Skilled adversaries can deceive detection and often employ new measures in their...

Flare-On 7 Challenge Solutions

5 days ago

We are thrilled to announce the conclusion of the seventh annual Flare-On...

FIN11: Widespread Email Campaigns as Precursor for Ransomware and Data Theft

15 days ago

Mandiant Threat Intelligence recently promoted a threat cluster to a named FIN...

Detecting Microsoft 365 and Azure Active Directory Backdoors

29 days ago

Mandiant has seen an uptick in incidents involving Microsoft 365 (M365) and...

Fuzzing Image Parsing in Windows, Part One: Color Profiles

about 1 month ago

Image parsing and rendering are basic features of any modern operating system...

A "DFUR-ent" Perspective on Threat Modeling and Application Log Forensic Analysis

about 1 month ago

Many organizations operating in e-commerce, hospitality, healthcare managed services, and other service...

Emulation of Malicious Shellcode With Speakeasy

2 months ago

In order to enable emulation of malware samples at scale, we have...

A Hands-On Introduction to Mandiant's Approach to OT Red Teaming

2 months ago

Operational technology (OT) asset owners have historically considered red teaming of OT...

COOKIEJAR: Tracking Adversaries With FireEye Endpoint Security’s Logon Tracker Module

3 months ago

During a recent investigation at a telecommunications company led by Mandiant Managed...

COOKIEJAR: Tracking Adversaries With FireEye Endpoint Security’s Logon Tracker Module

3 months ago

During a recent investigation at a telecommunications company led by Mandiant Managed...

Bypassing MassLogger Anti-Analysis — a Man-in-the-Middle Approach

3 months ago

The FireEye Front Line Applied Research & Expertise (FLARE) Team attempts to...