FireEye to Discuss Advanced Android "VIP Attacks" and Microsoft PowerShell Attacks at Black Hat USA 2014

Actualizado el 4 de agosto, 2014 - 17.00hs.

MILPITAS, CA -- (Marketwired) -- 08/04/14 -- FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today's advanced cyber attacks, today announced it is hosting three briefings at Black Hat USA 2014: an advanced attack against Android phones; how to identify attacks leveraging Microsoft PowerShell; and how Planet Earth has become hackers' playground via command and control operations.

The first briefing will address "Sidewinder Targeted Attacks," also known as VIP attacks, which target victims by intercepting location information reported from aggressive ad libraries that utilize the Android platform. These aggressive ad libraries leak user information and allow for Android devices to be hijacked by attackers to gain total control (for example, send texts, turn on/off cameras and microphones and much more). To learn more, attend:

What: Sidewinder Targeted Attack Against Android in the Golden Age of Ad Libs

Who: Tao Wei, senior staff research scientist, FireEye and Yulong Zhang, senior software research engineer, FireEye

When: August 7th, 10:15 - 11:15am

Where: Mandalay Bay, South Seas GH

The second briefing will provide an overview of how Microsoft admin tools such as PowerShell have become strong surrogates for malware and how to remedy this issue. This presentation will focus on common attack patterns performed through PowerShell, and offer advice on identifying and preventing such attacks. To learn more, attend:

What: Investigating PowerShell Attacks

Who: Ryan Kazanciyan, technical director, Mandiant and author Matt Hastings, consultant, Mandiant

When: August 7th, 3:30 - 4:30pm

Where: Mandalay Bay, South Seas GH

The third briefing draws a new map of Planet Earth, based not on traditional parameters, but on hacker command and control (C2) communications. The primary data points used in this worldwide cyber survey are more than 30 million malware callbacks to over 200 countries and territories over an 18-month period, from January 2013 to June 2014. To learn more, attend:

What: Leviathan: Command And Control Communications On Planet Earth

Who: Kevin Thompson, threat analyst, FireEye and Kenneth Geers, independent researcher and former senior global threat analyst, FireEye

When: August 7th, 10:15 - 11:15am

Where: Mandalay Bay, South Seas F

Also visit the FireEye booth (#411) to learn more about emerging cybersecurity threats. Copies of the newly released Incident Response & Computer Forensics, Third Edition by Jason Luttgens, Matthew Pepe, and Kevin Mandia will also be available at the booth.

About FireEye, Inc.

FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 2,200 customers across more than 60 countries, including over 130 of the Fortune 500.

© 2014 FireEye, Inc. All rights reserved. FireEye and Mandiant are registered trademarks or trademarks of FireEye, Inc. in the United States and other countries. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.

Media Contact
Vitor De Souza
(415) 699-9838
vitor.desouza@fireeye.com

Investor Contact
Kate Patterson
FireEye, Inc.
408-321-4957
kate.patterson@fireeye.com

Publicidad

Lo más leído »

Publicidad

Más Secciones »

Hola Invitado