Going To Ground with The Windows Scripting Host (WSH)
February 19 2014About a month ago, I was involved in an investigation that revealed a targeted attacker using an interesting variation of a well-known ...
Read moreAbout a month ago, I was involved in an investigation that revealed a targeted attacker using an interesting variation of a well-known ...
Read moreAbout a month ago, I was involved in an investigation that revealed a targeted attacker using an interesting variation of a well-known ...
Read moreOn February 11, FireEye identified a zero-day exploit (CVE-2014-0322) being served up from the U.S. Veterans of Foreign Wars’ website (vfw[.]org). We believe the attack is a...
Read moreOn February 11, FireEye identified a zero-day exploit (CVE-2014-0322) being served up from the U.S. Veterans of Foreign Wars’ website (vfw[.]org). We believe the attack is a...
Read moreOn February 11, FireEye identified a zero-day exploit (CVE-2014-0322) being served up from the U.S. Veterans of Foreign Wars’ website (vfw[.]org). We believe the attack is a...
Read moreOn February 11, FireEye identified a zero-day exploit (CVE-2014-0322) being served up from the U.S. Veterans of Foreign Wars’ website (vfw[.]org). We believe the attack is a...
Read moreWelcome to my first post as a FireEye™ employee! Many of you have asked me what I think of FireEye's acquisition of Mandiant. One...
Read moreWelcome to my first post as a FireEye™ employee! Many of you have asked me what I think of FireEye's acquisition of Mandiant. One...
Read moreWelcome to my first post as a FireEye™ employee! Many of you have asked me what I think of FireEye's acquisition of Mandiant. One...
Read moreWelcome to my first post as a FireEye™ employee! Many of you have asked me what I think of FireEye's acquisition of Mandiant. One...
Read more
Recent Comments