- [FireEye]A Little Bird Told Me: Personal Information Sharing in Angry Birds and
its Ad Libraries
- [FireEye]From Windows to Droids: An Insight in to Multi-vector Attack Mechanisms
in RATs
- [FireEye]Spear Phishing the News Cycle: APT Actors Leverage Interest in the
Disappearance of Malaysian Flight MH 370
- [FireEye]Android.MisoSMS : Its Back! Now With XTEA
- [FireEye]A Detailed Examination of the Siesta Campaign
- [FireEye]Crimeware or APT Malware: Fifty Shades of Grey
- [FireEye]DLL Side-Loading: Another Blind-Spot for Anti-Virus
- [FireEye]NGOs: Fighting Human Rights Violations and, Now, Cyber Threat Groups
- [FireEye]Occupy Your Icons Silently on Android
- [FireEye]The PLA and the 8:00am-5:00pm Work Day: FireEye Confirms DOJ's Findings
on APT1 Intrusion Activity
- [FireEye]Strategic Analysis: As Russia-Ukraine Conflict Continues, Malware
Activity Rises
- [FireEye]A Not-So Civic Duty: Asprox Botnet Campaign Spreads Court Dates and
Malware
- [FireEye]Clandestine Fox, Part Deux
- [FireEye]Molerats, Here for Spring!
- [FireEye]Preying on Insecurity: Placebo Applications With No Functionality on
Google Play and Amazon.com
- [FireEye]Turing Test in Reverse: New Sandbox-Evasion Techniques Seek Human Interaction
- [FireEye]What are you doing? – DSEncrypt Malware
- [FireEye]BrutPOS: RDP Bruteforcing Botnet Targeting POS Systems
- [FireEye]Havex, It’s Down With OPC
- [FireEye]Operation Tovar: The Latest Attempt to Eliminate Key Botnets
- [FireEye]The Little Signature That Could: The Curious Case of CZ Solution
- [FireEye]New Targeted Attack in the Middle East by APT34, a Suspected Iranian
Threat Group, Using CVE-2017-11882 Exploit
- [FireEye]The Service You Can’t Refuse: A Secluded HijackRAT
- [FireEye]Darwin’s Favorite APT Group
- [FireEye]FLARE IDA Pro Script Series: Simplifying Graphs in IDA
- [FireEye]Debugging Complex Malware that Executes Code on the Heap
- [FireEye]FLARE IDA Pro Script Series: Automatic Recovery of Constructed Strings
in Malware
- [FireEye]FLARE IDA Pro Script Series: MSDN Annotations IDA Pro for Malware Analysis
- [FireEye]Double-edged Sword: Australia Economic Partnerships Under Attack from China
- [FireEye]APT28: A Window into Russia's Cyber Espionage Operations?
- [FireEye]Attackers Deploy New ICS Attack Framework “TRITON” and Cause Operational
Disruption to Critical Infrastructure
- [FireEye]Targeted Attacks against Banks in the Middle East
- [FireEye]Recognizing and Avoiding Disassembled Junk
- [Sophos]Chinese police get facial recognition glasses
- [FireEye]Newly Observed Ursnif Variant Employs Malicious TLS Callback Technique
to Achieve Process Injection
- [FireEye]Magniber Ransomware Wants to Infect Only the Right People
- [Sophos]Robot’s revenge – the CAPTCHA that stops humans
- [FireEye]BACKSWING - Pulling a BADRABBIT Out of a Hat
- [FireEye]Introducing GoCrack: A Managed Password Cracking Tool
- [Eset]How will WPA3 improve WiFi security?
- [FireEye]New FakeNet-NG Feature: Content-Based Protocol Detection
- [FireEye]2017 Flare-On Challenge Solutions
- [FireEye]Significant FormBook Distribution Campaigns Impacting the U.S. and South Korea
- [FireEye]Insights into Iranian Cyber Espionage: APT33 Targets Aerospace and
Energy Sectors and has Ties to Destructive Malware
- [FireEye]FLARE VM: The Windows Malware Analysis Distribution You’ve Always Needed!
- [FireEye]Introducing pywintrace: A Python Wrapper for ETW
- [AVAST]4 tips for parents of the smartphone generation
- [Sophos]WordPress denial-of-service attacks – how real is the problem? [VIDEO]
- [Sophos]iOS ‘iBoot’ source code posted online, Apple issues DMCA takedown notice
- [kreb]U.S. Arrests 13, Charges 36 in ‘Infraud’ Cybercrime Forum Bust