Showing page 1281 of 1290 of 1750 results.

Blog
We identified an operation focused on Ukrainian government involving trojanized Windows 10 Operating System installers.
Blog
We observed campaigns distributing a new, previously unreported variant of the popular banking malware, URSNIF.
Blog
On Advanced Practices, we are always looking for new ways to find malicious activity and track adversaries over time. Today we’re sharing a technique we use to detect and cluster Microsoft Office documents—specifically those in the  Office Open XML (OOXML)  file format. Additionally, we’re releasing a tool so analysts and defenders can automatically generate YARA rules using this technique.
Blog
PwnAuth is a web application framework that makes it easier for organizations to test their ability to detect and respond to OAuth abuse campaigns.
Blog
In May of 2016, Mandiant’s Red Team discovered a series of vulnerabilities present on Lenovo’s Vibe P1 Android-based mobile device that allow local privilege escalation to the user “root”.