Citrix XenApp and XenDesktop Hardening Guidance
March 15 2016A Joint Whitepaper from Mandiant and Citrix Throughout the course of Mandiant’s Red Team and Incident Response engagements, we frequently identify a wide array of ...
Read moreA Joint Whitepaper from Mandiant and Citrix Throughout the course of Mandiant’s Red Team and Incident Response engagements, we frequently identify a wide array of ...
Read moreIntroduction On Feb. 19, IBM XForce researchers released an intelligence report [1] stating that the source code for GM Bot was leaked to...
Read moreIntroduction On Feb. 19, IBM XForce researchers released an intelligence report [1] stating that the source code for GM Bot was leaked to...
Read moreNewspapers have the ability to do more than simply keep us current with worldly affairs; we can use them to squash bugs! Yet, as we move from...
Read moreNewspapers have the ability to do more than simply keep us current with worldly affairs; we can use them to squash bugs! Yet, as we move from...
Read moreNewspapers have the ability to do more than simply keep us current with worldly affairs; we can use them to squash bugs! Yet, as we move from...
Read moreNewspapers have the ability to do more than simply keep us current with worldly affairs; we can use them to squash bugs! Yet, as we move from...
Read moreNewspapers have the ability to do more than simply keep us current with worldly affairs; we can use them to squash bugs! Yet, as we move from...
Read moreNewspapers have the ability to do more than simply keep us current with worldly affairs; we can use them to squash bugs! Yet, as we move from...
Read moreIntroduction This post continues the FireEye Labs Advanced Reverse Engineering (FLARE) script series. In this post, we continue to discuss the flare-dbg project. If you haven’t...
Read more
Recent Comments