- [FireEye]Operation Ephemeral Hydra: IE Zero-Day Linked to DeputyDog Uses Diskless Method
- [FireEye]The Dual Use Exploit: CVE-2013-3906 Used in Both Targeted Attacks and
Crimeware Campaigns
- [FireEye]CVE-2013-3346/5065 Technical Analysis
- [FireEye]MisoSMS: New Android Malware Disguises Itself as a Settings App, Steals
SMS Messages
- [FireEye]Android.HeHe: Malware Now Disconnects Phone Calls
- [FireEye]Amazon's Mobile Shopping Clients and CAPTCHA
- [Sophos]Have federal nuclear supercomputer? GO CRYPTOMINING!
- [FireEye]Background Monitoring on Non-Jailbroken iOS 7 Devices -- and a Mitigation
- [FireEye]Operation GreedyWonk: Multiple Economic and Foreign Policy Sites
Compromised, Serving Up Flash Zero-Day Exploit
- [FireEye]Operation SnowMan: DeputyDog Actor Compromises US Veterans of Foreign
Wars Website
- [FireEye]The 2013 FireEye Advanced Threat Report!
- [AVAST]3 unique and unusual Valentine’s gift ideas to make digital hearts sing
- [FireEye]XtremeRAT: Nuisance or Threat?
- [FireEye]A Little Bird Told Me: Personal Information Sharing in Angry Birds and
its Ad Libraries
- [FireEye]From Windows to Droids: An Insight in to Multi-vector Attack Mechanisms
in RATs
- [FireEye]Spear Phishing the News Cycle: APT Actors Leverage Interest in the
Disappearance of Malaysian Flight MH 370
- [FireEye]Android.MisoSMS : Its Back! Now With XTEA
- [FireEye]A Detailed Examination of the Siesta Campaign
- [FireEye]Crimeware or APT Malware: Fifty Shades of Grey
- [FireEye]DLL Side-Loading: Another Blind-Spot for Anti-Virus
- [FireEye]NGOs: Fighting Human Rights Violations and, Now, Cyber Threat Groups
- [FireEye]Occupy Your Icons Silently on Android
- [FireEye]The PLA and the 8:00am-5:00pm Work Day: FireEye Confirms DOJ's Findings
on APT1 Intrusion Activity
- [FireEye]Strategic Analysis: As Russia-Ukraine Conflict Continues, Malware
Activity Rises
- [FireEye]A Not-So Civic Duty: Asprox Botnet Campaign Spreads Court Dates and
Malware
- [FireEye]Clandestine Fox, Part Deux
- [FireEye]Molerats, Here for Spring!
- [FireEye]Preying on Insecurity: Placebo Applications With No Functionality on
Google Play and Amazon.com
- [FireEye]Turing Test in Reverse: New Sandbox-Evasion Techniques Seek Human Interaction
- [FireEye]What are you doing? – DSEncrypt Malware
- [FireEye]BrutPOS: RDP Bruteforcing Botnet Targeting POS Systems
- [FireEye]Havex, It’s Down With OPC
- [FireEye]Operation Tovar: The Latest Attempt to Eliminate Key Botnets
- [FireEye]The Little Signature That Could: The Curious Case of CZ Solution
- [FireEye]New Targeted Attack in the Middle East by APT34, a Suspected Iranian
Threat Group, Using CVE-2017-11882 Exploit
- [FireEye]The Service You Can’t Refuse: A Secluded HijackRAT
- [FireEye]Darwin’s Favorite APT Group
- [FireEye]FLARE IDA Pro Script Series: Simplifying Graphs in IDA
- [FireEye]Debugging Complex Malware that Executes Code on the Heap
- [FireEye]FLARE IDA Pro Script Series: Automatic Recovery of Constructed Strings
in Malware
- [FireEye]FLARE IDA Pro Script Series: MSDN Annotations IDA Pro for Malware Analysis
- [FireEye]Double-edged Sword: Australia Economic Partnerships Under Attack from China
- [FireEye]APT28: A Window into Russia's Cyber Espionage Operations?
- [FireEye]Attackers Deploy New ICS Attack Framework “TRITON” and Cause Operational
Disruption to Critical Infrastructure
- [FireEye]Targeted Attacks against Banks in the Middle East
- [FireEye]Recognizing and Avoiding Disassembled Junk
- [Sophos]Chinese police get facial recognition glasses
- [FireEye]Newly Observed Ursnif Variant Employs Malicious TLS Callback Technique
to Achieve Process Injection
- [FireEye]Magniber Ransomware Wants to Infect Only the Right People
- [Sophos]Robot’s revenge – the CAPTCHA that stops humans