Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

fireeye.com

Threat Research Blog

Get the latest updates from Threat Research Blog directly as they happen.

Follow now 97 followers

Latest posts

Last updated 7 days ago

Election Cyber Threats in the Asia-Pacific Region

7 days ago

In democratic societies, elections are the mechanism for choosing heads of state...

WOW64!Hooks: WOW64 Subsystem Internals and Hooking Techniques

20 days ago

Microsoft is known for their backwards compatibility. When they rolled out the...

WOW64!Hooks: WOW64 Subsystem Internals and Hooking Techniques

20 days ago

Microsoft is known for their backwards compatibility. When they rolled out the...

In Wild Critical Buffer Overflow Vulnerability in Solaris Can Allow Remote Takeover — CVE-2020-14871

25 days ago

FireEye Mandiant has been investigating compromised Oracle Solaris machines in customer environments...

In Wild Critical Buffer Overflow Vulnerability in Solaris Can Allow Remote Takeover — CVE-2020-14871

25 days ago

FireEye Mandiant has been investigating compromised Oracle Solaris machines in customer environments...

Live off the Land? How About Bringing Your Own Island? An Overview of UNC1945

27 days ago

Through Mandiant investigation of intrusions, the FLARE Advanced Practices team observed a...

Live off the Land? How About Bringing Your Own Island? An Overview of UNC1945

27 days ago

Through Mandiant investigation of intrusions between February 2018 and September 2020, the...

Unhappy Hour Special: KEGTAP and SINGLEMALT With a Ransomware Chaser

about 1 month ago

Throughout 2020, ransomware activity has become increasingly prolific, relying on an ecosystem...

Unhappy Hour Special: KEGTAP and SINGLEMALT With a Ransomware Chaser

about 1 month ago

Throughout 2020, ransomware activity has become increasingly prolific, relying on an ecosystem...

Welcome to ThreatPursuit VM: A Threat Intelligence and Hunting Virtual Machine

about 1 month ago

Skilled adversaries can deceive detection and often employ new measures in their...

Welcome to ThreatPursuit VM: A Threat Intelligence and Hunting Virtual Machine

about 1 month ago

Skilled adversaries can deceive detection and often employ new measures in their...