Government Sector in Central Asia Targeted With New HAWKBALL Backdoor Delivered via Microsoft Office Vulnerabilities

Original Post from FireEye Author: Swapnil Patil FireEye Labs recently observed an attack against the government…

Hunting COM Objects

Original Post from FireEye Author: Charles Hamilton COM objects have recently been used by penetration testers,…

Framing the Problem: Cyber Threats and Elections

Original Post from FireEye Author: Luke McNamara This year, Canada, multiple European nations, and others will…

Learning to Rank Strings Output for Speedier Malware Analysis

Original Post from FireEye Author: Philip Tully Reverse engineers, forensic investigators, and incident responders have an…

Network of Social Media Accounts Impersonates U.S. Political Candidates, Leverages U.S. and Israeli Media in Support of Iranian Interests

Original Post from FireEye Author: Alice Revelli In August 2018, FireEye Threat Intelligence released a report…

Hunting COM Objects (Part Two)

Original Post from FireEye Author: Brett Hawkins Background As a follow up to Part One in…

Government Sector in Central Asia Targeted With New HAWKBALL Backdoor Delivered via Microsoft Office Vulnerabilities

Original Post from FireEye Author: Swapnil Patil FireEye Labs recently observed an attack against the government…

WordPress Appliance - Powered by TurnKey Linux