Fire-Eye - Countermeasures to tools stolen.
Hi all,
In case the companies you work in need this please see below
https://www.fireeye.com/blog/threat-research/2020/12/unauthorized-access-of-fireeye-red-team-tools.html
re: countermeasures against the tools that were stolen (Fire-Eye). May prove to be handy (YARA rules, Clam signatures, Snort etc.)
In case the companies you work in need this please see below
https://www.fireeye.com/blog/threat-research/2020/12/unauthorized-access-of-fireeye-red-team-tools.html
re: countermeasures against the tools that were stolen (Fire-Eye). May prove to be handy (YARA rules, Clam signatures, Snort etc.)
AWS, Azure, GCP, ISC2, GIAC, ISACA, TOGAF, SABSA, EC-Council, Comptia...
Comments
-
JDMurray Admin Posts: 13,099 AdminThe tool activity detection rules that FireEye released on GitHub will provide endless puzzle opportunities for CTFs for years to come.