Tag Archives: Mandiant

Hackers: You Can’t Beat Them, But You Can Sure Make Their Lives Difficult

This is one of the main ideas I came away with after attending the Mandiant/FireEye webinar yesterday. The webinar, “From the Front lines: What really happened at MIRcon” (Mandiant Incidence Response Conference) summarized some of the main talks from that … Continue reading

Posted in Uncategorized | Tagged , , , , , , | Leave a comment

Mandiant Webinar Highlights the Difficulty of Dealing with the Latest Varieties of Cyber Attacks

In the latest Mandiant webinar, consultants Chris Oetting and Mike Middleton explained the difficulty of restoring an organization’s network after it has suffered a serious cyber attack. About 30% of recent cyber attacks that Mandiant has responded to involve organizations … Continue reading

Posted in Uncategorized | Tagged , , , , , | Leave a comment

Businesses, Government Agencies, and Political Dissenters Beware. Chinese Predators May Be Lurking at the Waterhole: Understanding Waterhole Attacks

There are three main reasons for hacking. One is for financial gain, one is for acquiring protected information, and the third is to achieve some political objective. The second reason for hacking, that of acquiring protected information, is often used, … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , | Leave a comment