The Joshua Tree Report is coming, I promise.
Wednesday, 12 April 2017
Mandiant Threat Intelligence Reports
On a recent flight, I read Mandiant's 2013 report on APT1. Mandiant, which is now a division of FireEye, has produced a bunch of similar threat intelligence reports. I'm basically posting this list to make it easier for me to download a bunch of their stuff, but it may be of some interest to other folks.
A daily grind: Filtering Java vulnerabilities
APT1: Exposing one of China's cyber espionage units
APT1: Digital appendix and indicators
APT28: A Window Into Russia's Cyber Espionage Operations?
Brewing up trouble: Analyzing four widely exploited Java vulnerabilities
Digital bread crumbs: Seven clues to identifying who's behind advanced cyber attacks
DLL Side-loading: A thorn in the side of the anti-virus industry
Hot knives through butter: Evading file-based sandboxes
IANS Data Compromise Awareness
Investigating PowerShell attacks
Leviathan: Command and control communications on planet Earth
NIST: Best Practices in Cyber Security Chain Risk Management
Operation “Ke3chang”: Targeted attacks against ministries of foreign affairs
Operation Saffron Rose
Poison Ivy: Assessing damage and extracting intelligence
Red Line Drawn: China recalculates its use of cyber espionage
Sidewinder Targeted Attack against Android in the golden age of ad libraries
Supply chain analysis: From quartermaster to sunshop
The Little Malware That Could: Detecting and defeating the China Chopper Web Shell
Top words used in spear phishing attacks
Windows Management Instrumentation (WMI) offense, defense, and forensics
The Joshua Tree Report is coming, I promise.
The Joshua Tree Report is coming, I promise.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment