Showing page 11 of 20 of 24 results.

BlogBlog
In this blog we take a closer look at the powerful, versatile backdoor known as CARBANAK (aka , Anunak, ).
BlogBlog
This blog post presents a machine learning approach to detecting obfuscated Windows command line invocations on endpoints.
BlogBlog
In this blog post we discuss multiple targeted phishing campaigns designed to download and deploy a backdoor we track as MINEBRIDGE.
BlogBlog
This blog post illustrates how FireEye is leveraging artificial intelligence and machine learning to raise the bar for adversaries that use PowerShell.
BlogBlog
In this blog post we discuss how Speakeasy can be effective at automatically identifying rootkit activity from the kernel mode binary.
BlogBlog
The FireEye Labs Advanced Reverse Engineering (FLARE) Team is sharing a third installment of a blog about the IDA Pro script with the community.
BlogBlog
This blog post shines a heat lamp on the latest tradecraft of UNC2198, who,  , used ICEDID infections to deploy MAZE or EGREGOR ransomware.
BlogBlog
This is the first of two blogs that discuss the implementation of the Windows console architecture from years past, with a primary focus on the current implementation present on modern versions of Windows.
BlogBlog
This is the second of two blogs that discuss the implementation of the Windows console architecture from years past, with a primary focus on the current implementation present on modern versions of Windows.
BlogBlog
This blog post details various PowerShell logging options and how they can help you obtain the visibility needed to better respond, investigate, and remediate attacks involving PowerShell.