FireEye, Inc. is a publicly listed enterprise cybersecurity company that provides products and services to protect against advanced cyber threats, such as advanced persistent threats and spear phishing. Founded in 2004, the company is headquartered in Milpitas, California.

Wikipedia
FireEye, Inc.
FireEye, Inc.
Blog Post
  • Teams from all across FireEye have been preparing for a long while now to be ready for the incoming <a href="https://www.fireeye.com/current-threats/gdpr.html">EU General Data Protection Regulation (GDPR), which officially goes into effect on May 25, 2018. GDPR is meant to protect consumers and their data; however, cyber criminals are taking advantage of the widespread attention surrou...

FireEye, Inc.
FireEye, Inc.
Blog Post
  • I recently had the opportunity to speak with Jared Semrau, head of our vulnerability and exploitation intelligence team. Jared filled me in on how his team gathers information on new and existing exploitable bugs, how they combine that with what FireEye knows from engagements and device detections, and how they map that intelligence to known threat actors. There are a lot of myths goi...

FireEye, Inc.
FireEye, Inc.
Blog Post
  • Many cyber security conferences offer forward-thinking sessions that are great for discussing emerging trends; however, they often do little to prepare security professionals for threats impacting the industry at that moment. At FireEye, we want attendees to walk away from our events feeling immediately empowered, so we planned our upcoming <a href="https://www.cyberscoop.com/events/cybe...

FireEye, Inc.
FireEye, Inc.
Blog Post
  • It’s hard to believe, but last month marked the release of our <a href="https://www.fireeye.com/current-threats/annual-threat-report/mtrends.html">9th edition of M-Trends. To learn more about the latest report, I sat down and spoke with one of the key contributors: Jurgen Kutscher, senior vice president responsible for all of our Mandiant Consulting and Managed Defense offerings at ...

FireEye, Inc.
FireEye, Inc.
Blog Post
  • While Russia and China remain atop the list of the most sophisticated cyber adversaries, FireEye has been observing an uptick in the number of state-sponsored cyber espionage campaigns from other countries. In fact, May 2017 marked the first time that FireEye announced an advanced persistent threat (APT) group attributed to a country other than Russia and China. That country was Vietnam,...

FireEye, Inc.
FireEye, Inc.
Blog Post
  • For IT staff and Windows power users, Microsoft Terminal Services Remote Desktop Protocol (RDP) is a beneficial tool that allows for the interactive use or administration of a remote Windows system. However, Mandiant consultants have also observed threat actors using RDP, with compromised domain credentials, to move laterally across networks with limited segmentation. To understand how ...

FireEye, Inc.
FireEye, Inc.
Blog Post
  • I recently had a chance to sit down and chat about email security with Ken Bagnall, VP of the FireEye Email Security side of the business. Ken came to FireEye following our 2017 acquisition of The Email Laundry, where he was a founder and CEO. During our chat, Ken and I discussed a wide variety of topics, including Ken’s history in the industry and how he got into email security, how...

FireEye, Inc.
FireEye, Inc.
Blog Post
  • FireEye Labs recently identified several widespread malspam (malware spam) campaigns targeting Brazilian companies with the goal of delivering banking Trojans. We are referring to these campaigns as Metamorfo. Across the stages of these campaigns, we have observed the use of several tactics and techniques to evade detection and deliver the malicious payload. In this blog post we dissect ...

FireEye, Inc.
FireEye, Inc.
YouTube Video
  • In episode 3, we were joined by Alex Lanstein (@alex_lanstein) - one of the first employees at FireEye who hunts through product telemetry data to identify new targeted campaigns. During the RSA conference, and with so many others referencing breaches and hunting from the periphery, we thought it would be good to chat about primary source data from our on-going APT and FIN attack investigations an...

FireEye, Inc.
FireEye, Inc.
Blog Post
  • In the wake of recent hacking tool dumps, the FLARE team saw a spike in malware samples detonating kernel shellcode. Although most samples can be analyzed statically, the FLARE team sometimes debugs these samples to confirm specific functionality. Debugging can be an efficient way to get around packing or obfuscation and quickly identify the structures, system routines, and processes tha...

FireEye, Inc.
FireEye, Inc.
Blog Post
  • Privacy laws occasionally conflict with the work of security professionals and law enforcement agencies. The most recent example of this comes in the form of the potential General Data Protection Regulation (GDPR) impacting the ICANN WHOIS Database. The debate is essentially over whether ICANN should continue to publish the name and contact details of domain registrants in the WHOIS data...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.