Frequent verification codes may appear for non-Mainland China IP visits. If visitors are severely affected, please send [IP|ASN](44.197.111.121|AS14618) to the bottom mailbox to add to the whitelist
文章列表
2021-10-09 05:01 Purgalicious VBA: Macro Obfuscation With VBA Purging #fireeye #安全文章 Purgalicious VBA: Macro Obfuscation With VBA Purging
2021-09-15 21:00 ELFant in the Room – capa v3 #fireeye #安全文章 Since our initial public release of capa, incident responders and reverse engineers have used the tool to automatically identify capabilities in Windows executables. With our newest code and ruleset updates, capa v3 also identifies capabilities in Executable and Linkable Format (ELF) files, s
2021-09-15 21:00 ELFant in the Room – capa v3 #fireeye #安全文章 Since our initial public release of capa, incident responders and reverse engineers have used th
2021-09-15 21:00 ELFant in the Room – capa v3 #fireeye #安全文章 Since our initial public release of capa, incident responders and reverse engineers have used th
2021-09-08 22:00 Pro-PRC Influence Campaign Expands to Dozens of Social Media Platforms, Websites, and Forums in at Least Seven Languages, Attempted to Physically Mobilize Protesters in the U.S. #fireeye #安全文章 In June 2019, Mandiant Threat Intelligence first reported to customers a pro-People’s Republic of C
2021-09-08 22:00 Pro-PRC Influence Campaign Expands to Dozens of Social Media Platforms, Websites, and Forums in at Least Seven Languages, Attempted to Physically Mobilize Protesters in the U.S. #fireeye #安全文章 In June 2019, Mandiant Threat Intelligence first reported to customers a pro-People’s Republic of C
2021-09-03 18:00 PST, Want a Shell? ProxyShell Exploiting Microsoft Exchange Servers #fireeye #安全文章 In August 2021, Mandiant Managed Defense identified and responded to the exploitation of a chain of
2021-09-03 18:00 PST, Want a Shell? ProxyShell Exploiting Microsoft Exchange Servers #fireeye #安全文章 In August 2021, Mandiant Managed Defense identified and responded to the exploitation of a chain of
2021-09-01 23:30 Too Log; Didn't Read — Unknown Actor Using CLFS Log Files for Stealth #fireeye #安全文章 The Mandiant Advanced Practices team recently discovered a new malware family we have named PRIVATE
2021-09-01 23:30 Too Log; Didn't Read — Unknown Actor Using CLFS Log Files for Stealth #fireeye #安全文章 The Mandiant Advanced Practices team recently discovered a new malware family we have named PRIVATE
2021-08-18 23:30 Detecting Embedded Content in OOXML Documents #fireeye #安全文章 On Advanced Practices, we are always looking for new ways to find malicious activity and track adve
2021-08-18 23:30 Detecting Embedded Content in OOXML Documents #fireeye #安全文章 On Advanced Practices, we are always looking for new ways to find malicious activity and track adve
2021-08-17 20:00 Mandiant Discloses Critical Vulnerability Affecting Millions of IoT Devices #fireeye #安全文章 Today, Mandiant disclosed a critical risk vulnerability in coordination with the Cybersecurity a
2021-08-17 20:00 Mandiant Discloses Critical Vulnerability Affecting Millions of IoT Devices #fireeye #安全文章 Today, Mandiant disclosed a critical risk vulnerability in coordination with the Cybersecurity a
2021-08-12 23:30 Announcing the Eighth Annual Flare-On Challenge #fireeye #安全文章 The FLARE team is once again hosting its annual Flare-On challenge, now in its eighth year. Take this opportunity to enjoy some extreme social distancing by solving fun puzzles to test your mettle and learn new tricks on your path to reverse engineering excellence. The contest will begin at 8: