MESSAGETAP: Who’s Reading Your Text Messages?
October 31 2019FireEye Mandiant recently discovered a new malware family used by APT41 (a Chinese APT group) that is designed to monitor and save SMS traffic from specific phone...
Read moreFireEye Mandiant recently discovered a new malware family used by APT41 (a Chinese APT group) that is designed to monitor and save SMS traffic from specific phone...
Read moreIn Part One of this blog series, Steve Miller outlined what PDB paths are, how they appear in malware, how we use them to detect...
Read moreIn Part One of this blog series, Steve Miller outlined what PDB paths are, how they appear in malware, how we use them to detect...
Read moreIn Part One of this blog series, Steve Miller outlined what PDB paths are, how they appear in malware, how we use them to detect...
Read moreIn August 2019, FireEye released the “Double Dragon” report on our newest graduated threat group: APT41. A China-nexus dual espionage and financially-focused group, APT41 targets industries...
Read moreDuring several recent incident response engagements, FireEye Mandiant investigators uncovered new tools in FIN7’s malware arsenal and kept pace as the global criminal operators...
Read moreHave you ever wondered what goes through the mind of a malware author? How they build their tools? How they organize their development projects? What kind of...
Read moreThe FireEye Labs Advanced Reverse Engineering (FLARE) team is thrilled to announce that the popular Flare-On reverse engineering challenge will return for the sixth...
Read moreReverse engineers, forensic investigators, and incident responders have an arsenal of tools at their disposal to dissect malicious software binaries. When performing malware analysis, they successively ...
Read moreReverse engineers, forensic investigators, and incident responders have an arsenal of tools at their disposal to dissect malicious software binaries. When performing malware analysis, they successively ...
Read more
Recent Comments