Dissecting a NETWIRE Phishing Campaign’s Usage of Process Hollowing

Original Post from FireEye Author: Sumith Maniath Introduction Malware authors attempt to evade detection by executing…

Breaking the Bank: Weakness in Financial AI Applications

Original Post from FireEye Author: Michelle Cantos Currently, threat actors possess limited access to the technology…

Going ATOMIC: Clustering and Associating Attacker Activity at Scale

Original Post from FireEye Author: Matt Berninger At FireEye, we work hard to detect, track, and…

APT40: Examining a China-Nexus Espionage Actor

Original Post from FireEye Author: Fred Plan FireEye is highlighting a cyber espionage operation targeting crucial…

FLARE Script Series: Recovering Stackstrings Using Emulation with ironstrings

Original Post from FireEye Author: Moritz Raabe This blog post continues our Script Series where the…

Bypassing Network Restrictions Through RDP Tunneling

Original Post from FireEye Author: David Pany Remote Desktop Services is a component of Microsoft Windows…

Cryptocurrency and Blockchain Networks: Facing New Security Paradigms

Original Post from FireEye Author: Randi Eitzman On Jan. 22, FireEye participated in a panel focused…

WordPress Appliance - Powered by TurnKey Linux