Advertised sites are not endorsed by us. They may be
unsafe, untrustworthy, or illegal in your jurisdiction.
Press release
Submit a press release here.
How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
DDoS Attacks
Posts Tagged ‘FireEye’
Most Recent
Read More
February 1, 2016

FireEye Purchases iSight, Focuses On Cyber Attacks Before They Happen

FireEye Inc paid $200 million to purchase iSight Partners Inc, a firm that deploys intelligence agents overseas in order to identify cyber attacks before they transpire. FireEye is adapting to changing threats in the cybersecurity realm with the bid.

FireEye has been in the hardware and software business since 2006, focusing on the detection and prevention of cyber attacks. The firm paid nearly $1 billion for Mandiant Corp. in 2014, a firm which investigates after attacks happen and boots hackers from penetrated systems. ISight tries to predict attacks before they happen, thus bringing nuance to FireEye’s portfolio. 

ISight claims to have [...]

Read More
November 4, 2015

XcodeGhost Malware Threatens iOS users, FireEye Warns

XcodeGhost malware remains a threat to iOS users, according to FireEye, the Milpitas, Calif.-based cyber security firm. In a Tuesday blog posting, FireEye noted that the threat remains despite the fact that Apple removed apps from the App Store and released more security features. The malware, despite Apple’s quick response, has been modified and the threat persists. iOS users learned of the threat just over a month ago.

FireEye found that XcodeGhost has entered U.S. enterprises and presents a security risk. The malware’s botnet remains partially active, and a variant called XcodeGhost S has gone undetected.

210 Enterprises Infected

FireEye monitored activity related to [...]

Read More
October 14, 2015

Casino Had 150,000 Credit Card Numbers Stolen Last Year

If you’re using networked computers, the chances are, at some point, you’re going to be vulnerable to a breach. Security professionals understand this best, but also understand that there are a lot of things one can do to prevent security breaches. When dealing with other people’s money and personal information, the onus to secure systems grows ten fold.

But according to FireEye, last year a breach of 150,000 credit cards took place at an unnamed casino. The attackers, who called themselves “Fin5,” had no trouble waltzing through the underwhelming security measures in place. The casino’s payment systems were not even firewalled. There was no logging [...]

Read More
September 24, 2015

XcodeGhost Malware Infects over 4,000 iOS Apps

Security researchers have discovered that the malicious app campaign plaguing Apple’s App Store is far worse than initially thought, with over 4000 App store applications affected by the XcodeGhost malware.

It was less than a week ago when Apple suffered its first major malware attack targeting its App Store. At the time, it was believed that 39 applications were infected with malware. However, security researchers at FireEye have now detected more than 4,000 infected applications in the App Store.

The original estimate of 39 infected applications was detailed in a report by Palo Alto Networks. Despite the relatively small number, millions of users were vulnerable due [...]

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University