Attackers have a dirty little secret that is being used to conduct big intrusions. We’ll explain how they're "unpatching" an exploit and then provide new Outlook hardening...
Read moreCertUtil Qualms: They Came to Drop FOMBs
October 29 2019This blog post covers an interesting intrusion attempt that Mandiant Managed Defense thwarted involving the rapid weaponization of a recently disclosed vulnerability combined with the creative use...
Read moreCertUtil Qualms: They Came to Drop FOMBs
October 29 2019This blog post covers an interesting intrusion attempt that Mandiant Managed Defense thwarted involving the rapid weaponization of a recently disclosed vulnerability combined with the creative use...
Read moreCertUtil Qualms: They Came to Drop FOMBs
October 29 2019This blog post covers an interesting intrusion attempt that Mandiant Managed Defense thwarted involving the rapid weaponization of a recently disclosed vulnerability combined with the creative use...
Read moreCertUtil Qualms: They Came to Drop FOMBs
October 29 2019This blog post covers an interesting intrusion attempt that Mandiant Managed Defense thwarted involving the rapid weaponization of a recently disclosed vulnerability combined with the creative use...
Read moreShowing Vulnerability to a Machine: Automated Prioritization of Software Vulnerabilities
August 13 2019Introduction If a software vulnerability can be detected and remedied, then a potential intrusion is prevented. While not all software vulnerabilities are known, 86 ...
Read moreShowing Vulnerability to a Machine: Automated Prioritization of Software Vulnerabilities
August 13 2019Introduction If a software vulnerability can be detected and remedied, then a potential intrusion is prevented. While not all software vulnerabilities are known, 86 ...
Read moreShowing Vulnerability to a Machine: Automated Prioritization of Software Vulnerabilities
August 13 2019Introduction If a software vulnerability can be detected and remedied, then a potential intrusion is prevented. While not all software vulnerabilities are known, 86 ...
Read moreMicrosoft Office Vulnerabilities Used to Distribute Zyklon Malware in Recent Campaign
January 17 2018Introduction FireEye researchers recently observed threat actors leveraging relatively new vulnerabilities in Microsoft Office to spread Zyklon HTTP malware. Zyklon has been observed in the wild since...
Read moreMicrosoft Office Vulnerabilities Used to Distribute Zyklon Malware in Recent Campaign
January 17 2018Introduction FireEye researchers recently observed threat actors leveraging relatively new vulnerabilities in Microsoft Office to spread Zyklon HTTP malware. Zyklon has been observed in the wild since...
Read more
Recent Comments