/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

@fireeye

@fireeye
17 posts
2021-11-09
We're proud that our @McAfee_ATR team supported this investigation that has led to multiple arrests. https://www.europol.europa.eu/ ...
2021-11-09 View on X
The Record

Europol has arrested seven people suspected of helping REvil and GandCrab with over 7,000 cyberattacks since early 2019, in a Romanian-led investigation

Catalin Cimpanu / The Record :

We're proud that our @McAfee_ATR team supported this investigation that has led to multiple arrests. https://www.europol.europa.eu/ ...
2021-11-09 View on X
CNN

US charges a Ukrainian suspect, arrested in Poland last month, and a Russian citizen over REvil attacks, and says it seized $6M in ransom payments

(CNN)Law enforcement officials have seized an estimated $6 million in ransom payments, and the US Justice Department is expected to announce Monday …

2021-06-03
We have entered into a definitive agreement to sell the FireEye Products business, including the FireEye name, to Symphony Technology Group. This will separate FireEye's products suite from @Mandiant Solutions' controls-agnostic software and services. https://www.fireeye.com/...
2021-06-03 View on X
TechCrunch

FireEye says it is selling its products business to PE firm Symphony Technology Group for $1.2B in cash; deal splits FireEye from digital forensics arm Mandiant

Cybersecurity giant FireEye has agreed to sell its products business to a consortium led by private equity firm Symphony Technology Group for $1.2 billion.

2021-04-30
Read the #RansomwareTaskForce report by @ist_org, with 48 actions to mitigate ransomware. We're proud to have played a part in this groundbreaking coalition. This is not a threat anyone can address alone. ▶️ http://securityandtechnology.org/ ... https://twitter.com/...
2021-04-30 View on X
Washington Post

A task force of 60+ experts from industry, government, nonprofits, and academia calls on the US and allies to take steps to fight a surge in ransomware attacks

the Secret Weapon to Combatting Ransomware Danny Palmer / ZDNet : Ransomware is now a national security risk. This group thinks it knows how to defeat it Duncan Riley / SiliconANG...

2021-03-07
.@Mandiant Managed Defense observed multiple instances of abuse of Microsoft Exchange Server within at least one client environment. So we built #threathunting campaigns to identify additional Exchange Server abuse. Learn more: https://www.fireeye.com/... https://twitter.com/...
2021-03-07 View on X
Krebs on Security

Sources: at least 30K US organizations have been hacked by an aggressive Chinese espionage group exploiting unpatched flaws in Microsoft's Exchange Server

At least 30,000 organizations across the United States — including a significant number of small businesses, towns …

2021-03-06
.@Mandiant Managed Defense observed multiple instances of abuse of Microsoft Exchange Server within at least one client environment. So we built #threathunting campaigns to identify additional Exchange Server abuse. Learn more: https://www.fireeye.com/... https://twitter.com/...
2021-03-06 View on X
Krebs on Security

Sources: at least 30K US organizations have been hacked by an aggressive Chinese espionage group exploiting unpatched flaws in Microsoft's Exchange Server

At least 30,000 organizations across the United States — including a significant number of small businesses, towns …

2021-01-20
As we continue to help organizations detect, protect against, and respond to the group behind the SUNBURST malware, #UNC2452, @Mandiant has released a new white paper and investigative tool. Learn more: https://www.fireeye.com/... https://twitter.com/...
2021-01-20 View on X
ZDNet

FireEye releases a free tool that audits networks to determine whether certain techniques, known to be employed by SolarWinds hackers, were used

Focusing on UNC2452 TTPs Lily Hay Newman / Wired : The SolarWinds Hackers Used Tactics Other Groups Will Copy Zeljka Zorz / Help Net Security : Malwarebytes was breached by the Sol...

2020-12-15
For more information about the global software supply chain threat we identified, please read our blog post. https://www.fireeye.com/...
2020-12-15 View on X
Reuters

SolarWinds: under 18,000 customers were compromised between March and June via an update to its Orion software, leading to DHS, Treasury, Commerce Dept. hacks

LONDON/WASHINGTON (Reuters) - U.S. IT company SolarWinds said on Monday that up to 18,000 of its customers had downloaded …

For more information about the global software supply chain threat we identified, please read our blog post. https://www.fireeye.com/...
2020-12-15 View on X
Wall Street Journal

Source: Treasury's hackers used a flaw in a SolarWinds product; SolarWinds, which touts 300K+ customers, says the flaw was the result of a “supply chain attack”

and it has the Kremlin's fingerprints all over it. https://www.bloomberg.com/... Thomas Brewster / @iblametom : New - A review of contract records shows DOD, FBI, DHS, Veterans Aff...

2020-12-14
For more information about the global software supply chain threat we identified, please read our blog post. https://www.fireeye.com/...
2020-12-14 View on X
Wall Street Journal

Source: Treasury's hackers used a flaw in a SolarWinds product; SolarWinds, which touts 300K+ customers, says the flaw was the result of a “supply chain attack”

Russia's foreign intelligence service is suspected of being behind effort to breach government networks

2020-07-31
The US isn't alone in slapping sanctions on cyber attackers. The EU joined today with sanctions on attackers behind WannaCry, NotPetya, and Operation Cloud Hopper. See what @JohnHultquist had to say about the sanctions. via @AP http://r.socialstudio.radian6.com/ ...
2020-07-31 View on X
Associated Press

EU imposes its first ever cyber sanctions, hitting six people and three organizations including GRU, for involvement in WannaCry, NotPetya, and other attacks

Place of birth: Shandong Province, China Federal Computer Week : FCW Insider: July 31 Francesco Guarascio / Reuters : EU sanctions Russian intelligence, North Korean, Chinese firms...

2020-04-08
Learn about an increase in #zerodays leveraged by groups suspected to be customers of companies that supply offensive cyber capabilities in the 1st blog post in a series that highlights the value of cyber #threatintel in enabling vulnerability management: http://r.socialstudio.radian6.com/ ... https://twitter.com/...
2020-04-08 View on X
Wired

FireEye details how zero-days were exploited worldwide from 2012 to 2019, says it was able to link the use of 55 zero-day exploits to state-sponsored operations

The collection of countries using those secret hacking techniques has expanded far beyond the usual suspects.

2020-03-26
We observed #APT41 carry out one of the broadest campaigns by a Chinese #cyberespionage actor in recent years as they attempted to exploit multiple vulnerabilities at over 75 of our customers around the globe. Learn about the attempted intrusions: http://r.socialstudio.radian6.com/ ... https://twitter.com/...
2020-03-26 View on X
FireEye

FireEye says that between January 20 and March 11 Chinese actor APT41 attempted to exploit bugs in Citrix and Zoho products at organizations in 20+ countries

2020-02-13
Today, Facebook took action against a set of 11 social accounts that they shared with us and, upon our independent review, we assessed were related to the broader Distinguished Impersonator activity set we've been tracking. >> Learn more: http://r.socialstudio.radian6.com/ ... https://twitter.com/...
2020-02-13 View on X
Financial Times

Facebook says it has banned a network of two dozen fake pages and accounts linked to two Southeast Asian telecoms for using disinformation against rivals

South-east Asian providers said to have used fake accounts to discredit rivals  —  Facebook has alleged that one of south-east Asia's …

2020-02-12
Today, Facebook took action against a set of 11 social accounts that they shared with us and, upon our independent review, we assessed were related to the broader Distinguished Impersonator activity set we've been tracking. >> Learn more: http://r.socialstudio.radian6.com/ ... https://twitter.com/...
2020-02-12 View on X
Financial Times

Facebook says it has banned a network of two dozen fake pages and accounts linked to two Southeast Asian telecoms for using disinformation against rivals

South-east Asian providers said to have used fake accounts to discredit rivals  —  Facebook has alleged that one of south-east Asia's …

2019-11-01
BLOG | MESSAGETAP: Who's Reading Your Text Messages? We recently discovered a new #malware family used by #APT41 that is designed to monitor and save SMS traffic from specific phone numbers, IMSI numbers and keywords for subsequent theft. >> Read more: http://r.socialstudio.radian6.com/ ... https://twitter.com/...
2019-11-01 View on X
FireEye

FireEye: Chinese state-backed hacker group APT41 is using malware called MESSAGETAP to parse and save SMS traffic from a telecom's network at scale

2019-10-31
BLOG | MESSAGETAP: Who's Reading Your Text Messages? We recently discovered a new #malware family used by #APT41 that is designed to monitor and save SMS traffic from specific phone numbers, IMSI numbers and keywords for subsequent theft. >> Read more: http://r.socialstudio.radian6.com/ ... https://twitter.com/...
2019-10-31 View on X
FireEye

FireEye: Chinese state-backed hacker group APT41 is using malware called MESSAGETAP to parse and save SMS traffic from a telecom's network at scale

FireEye Mandiant recently discovered a new malware family used by APT41 (a Chinese APT group) that is designed to monitor and save SMS traffic …