FireEye previously conducted an investigation into a
suspected network intrusion that a university system
administrator discovered when he noticed the presence
of suspicious files on a server. The investigation
revealed a compromise that affected three of the
university’s servers, and involve...
Technology is outpacing our
ability to secure it. Despite
substantial spending on legacy
security products, advanced
attackers are bypassing these
defenses at will and spreading
unchallenged. There’s no single technical answer.
There’s no legislative fix. Bad guys
will always exist, and ...
Technology is outpacing our ability to secure it. Despite substantial spending on legacy security products, advanced attackers are bypassing these defenses at will and spreading unchallenged. There’s no single technical answer. There’s no legislative fix. Bad guys will always exist, and determin...
This report provides a detailed, current look at the nature of advanced threats targeting organizations
today. Drawing on data gathered by FireEye® from several thousands of appliances at customer
sites around the world, across 89 million events, this report provides an overview of the current th...
While we have seen modest gains in
organizations’ ability to attack the
security gap, advanced (and not-so advanced)
threat actors continue to evolve their
tactics to find a way through it.
In last year’s M-Trends we noted that cyber
security had gone from a niche IT issue to a
For our M-Trends® 2017
report, we took a look at the incidents we investigated last year and provided
a global and regional (the Americas, Asia Pacific (APAC) and Europe, Middle
East, Africa (EMEA)) analysis focused on attack trends and defensive and emerging
On behalf of FireEye, IANS conducted a Return on Security (ROS) analysis of FireEye's Web Malware Protection System (MPS). To facilitate this study, IANS interviewed personnel from four FireEye customers, all of whom have direct responsibility for malware reduction and infection management, and who ...
Attackers targeted a wide spectrum of industries in 2014, including several that we had
not seen in large numbers before. While organizations learned of breaches sooner than
they did in 2013, attackers still roamed undetected in breached environments far too
long. And fewer victims discovered the...
The Russian cyber threat groups that we
monitor frequently design innovative
ways to cover their tracks. In early 2015,
we came across stealthy malware—which we
call HAMMERTOSS—from an advanced
persistent threat group that we suspect the
Russian government sponsors. We designate
There's been a rapid and dramatic shift from broad, scattershot attacks to advanced targeted attacks that have had serious consequences for victim organizations. Some of the most famous advanced targeted attacks, such as the attack on RSA, on HBGary Federal, and Operation Aurora all used spear phish...