The Russian cyber threat groups that we
monitor frequently design innovative
ways to cover their tracks. In early 2015,
we came across stealthy malware—which we
call HAMMERTOSS—from an advanced
persistent threat group that we suspect the
Russian government sponsors. We designate
Attackers targeted a wide spectrum of industries in 2014, including several that we had
not seen in large numbers before. While organizations learned of breaches sooner than
they did in 2013, attackers still roamed undetected in breached environments far too
long. And fewer victims discovered the...
Mobile devices have become critical in today’s digital workplace. But most organizations lack the security to ensure they, and the data they contain, are secure. Most security teams cannot fully account for—let alone monitor—the vast array of apps that have access to valuable corporate...
Technology is outpacing our ability to secure it. Despite substantial spending on legacy security products, advanced attackers are bypassing these defenses at will and spreading unchallenged. There’s no single technical answer. There’s no legislative fix. Bad guys will always exist, and determin...
For our M-Trends® 2017 report, we took a look at the incidents we investigated last year
and provided a global and regional (the Americas, Asia Pacific (APAC) and Europe,
Middle East, Africa (EMEA)) analysis focused on attack trends and defensive and
emerging trends. For the second consecutive y...
While we have seen modest gains in
organizations’ ability to attack the
security gap, advanced (and not-so advanced)
threat actors continue to evolve their
tactics to find a way through it.
In last year’s M-Trends we noted that cyber
security had gone from a niche IT issue to a
In 2015, more breaches than ever before became public
knowledge. Suffice it to say that the security industry
is changing because of new pressures being applied to
these victim organizations. They now have to respond
to the court of public opinion, as well as all other statutes,
FireEye previously conducted an investigation into a
suspected network intrusion that a university system
administrator discovered when he noticed the presence
of suspicious files on a server. The investigation
revealed a compromise that affected three of the
university’s servers, and involve...
FireEye intelligence analysts frequently
observe two types of advanced threat actors
targeting companies involved in healthcare
services, pharmaceuticals production, and medical
Cyber attacks are on the rise, and it’s no secret that
governmental organizations—both federal, state and local—
have found themselves the target of numerous high-profile attacks. But with so much critical information at stake, what should agencies
know about breaches, and how to defend aga...