Introduction Machine learning (ML) is playing an increasingly important role in cyber security. Here at FireEye, we employ ML for a variety of tasks such as: antivirus, ...
Read moreIntroduction Machine learning (ML) is playing an increasingly important role in cyber security. Here at FireEye, we employ ML for a variety of tasks such as: antivirus, ...
Read moreIntroduction Machine learning (ML) is playing an increasingly important role in cyber security. Here at FireEye, we employ ML for a variety of tasks such as: antivirus, ...
Read moreFinding Weaknesses Before the Attackers Do
April 8 2019This blog post originally appeared as an article in M-Trends 2019. FireEye Mandiant red team consultants perform objectives-based assessments that emulate real cyber attacks by advanced...
Read moreFor penetration testers looking for a stable and supported Linux testing platform, the industry agrees that Kali is the go-to platform. However,...
Read moreWinRAR Zero-day Abused in Multiple Campaigns
March 26 2019WinRAR, an over 20-year-old file archival utility used by over 500 million users worldwide, recently acknowledged a long-standing vulnerability in its code-base. A recently published path traversal zero-day vulnerability, disclosed in CVE-2018-20...
Read moreWinRAR Zero-day Abused in Multiple Campaigns
March 26 2019WinRAR, an over 20-year-old file archival utility used by over 500 million users worldwide, recently acknowledged a long-standing vulnerability in its code-base. A recently published path traversal zero-day vulnerability, disclosed in CVE-2018-20...
Read moreWinRAR Zero-day Abused in Multiple Campaigns
March 26 2019WinRAR, an over 20-year-old file archival utility used by over 500 million users worldwide, recently acknowledged a long-standing vulnerability in its code-base. A recently published path traversal zero-day vulnerability, disclosed in CVE-2018-20...
Read moreIntroduction Malware authors attempt to evade detection by executing their payload without having to write the executable file on the disk. One of the most commonly seen...
Read moreIntroduction Malware authors attempt to evade detection by executing their payload without having to write the executable file on the disk. One of the most commonly seen...
Read more
Recent Comments