Frequent verification codes may appear for non-Mainland China IP visits. If visitors are severely affected, please send [IP|ASN](18.232.127.73|AS14618) to the bottom mailbox to add to the whitelist

文章列表

2021-10-09 05:01   Purgalicious VBA: Macro Obfuscation With VBA Purging    #fireeye #安全文章 Purgalicious VBA: Macro Obfuscation With VBA Purging

2021-09-15 21:00   ELFant in the Room – capa v3    #fireeye #安全文章 Since our initial public release of capa, incident responders and reverse engineers have used the tool to automatically identify capabilities in Windows executables. With our newest code and ruleset updates, capa v3 also identifies capabilities in Executable and Linkable Format (ELF) files, s

2021-09-15 21:00   ELFant in the Room – capa v3    #fireeye #安全文章 Since our initial public release of capa, incident responders and reverse engineers have used th

2021-09-15 21:00   ELFant in the Room – capa v3    #fireeye #安全文章 Since our initial public release of capa, incident responders and reverse engineers have used th

2021-09-08 22:00   Pro-PRC Influence Campaign Expands to Dozens of Social Media Platforms, Websites, and Forums in at Least Seven Languages, Attempted to Physically Mobilize Protesters in the U.S.    #fireeye #安全文章 In June 2019, Mandiant Threat Intelligence first reported to customers a pro-People’s Republic of C

2021-09-08 22:00   Pro-PRC Influence Campaign Expands to Dozens of Social Media Platforms, Websites, and Forums in at Least Seven Languages, Attempted to Physically Mobilize Protesters in the U.S.    #fireeye #安全文章 In June 2019, Mandiant Threat Intelligence first reported to customers a pro-People’s Republic of C

2021-09-03 18:00   PST, Want a Shell? ProxyShell Exploiting Microsoft Exchange Servers    #fireeye #安全文章 In August 2021, Mandiant Managed Defense identified and responded to the exploitation of a chain of

2021-09-03 18:00   PST, Want a Shell? ProxyShell Exploiting Microsoft Exchange Servers    #fireeye #安全文章 In August 2021, Mandiant Managed Defense identified and responded to the exploitation of a chain of

2021-09-01 23:30   Too Log; Didn't Read — Unknown Actor Using CLFS Log Files for Stealth    #fireeye #安全文章 The Mandiant Advanced Practices team recently discovered a new malware family we have named PRIVATE

2021-09-01 23:30   Too Log; Didn't Read — Unknown Actor Using CLFS Log Files for Stealth    #fireeye #安全文章 The Mandiant Advanced Practices team recently discovered a new malware family we have named PRIVATE

2021-08-18 23:30   Detecting Embedded Content in OOXML Documents    #fireeye #安全文章 On Advanced Practices, we are always looking for new ways to find malicious activity and track adve

2021-08-18 23:30   Detecting Embedded Content in OOXML Documents    #fireeye #安全文章 On Advanced Practices, we are always looking for new ways to find malicious activity and track adve

2021-08-17 20:00   Mandiant Discloses Critical Vulnerability Affecting Millions of IoT Devices    #fireeye #安全文章 Today, Mandiant disclosed a critical risk vulnerability in coordination with the Cybersecurity a

2021-08-17 20:00   Mandiant Discloses Critical Vulnerability Affecting Millions of IoT Devices    #fireeye #安全文章 Today, Mandiant disclosed a critical risk vulnerability in coordination with the Cybersecurity a

2021-08-12 23:30   Announcing the Eighth Annual Flare-On Challenge    #fireeye #安全文章 The FLARE team is once again hosting its annual Flare-On challenge, now in its eighth year. Take this opportunity to enjoy some extreme social distancing by solving fun puzzles to test your mettle and learn new tricks on your path to reverse engineering excellence. The contest will begin at 8:

By QianX.in