The Latest in IT Security

Posts Tagged ‘least five years’

“Red October” in the title of Tom Clancy’s bestselling novel referred to a Soviet submarine whose silent propulsion system made it undetectable to sonar. It’s a fitting name for the sophisticated cyber-espionage network that has recently been identified after collecting high-level data from governments, embassies and diplomatic networks, energy companies, and other sensitive systems for […]

Read more ...

Here’s a link to the full paper (part 1) about our Red October research. During the next days, we’ll be publishing Part 2, which contains a detailed technical analysis of all the known modules. Please stay tuned. During the past five years, a high-level cyber-espionage campaign has successfully infiltrated computer networks at diplomatic, governmental and […]

Read more ...

Sr. Malware Researcher Posted: 9 May 2012 Company name: FireEye Location: Milpitas CA United States Travel: none Poster represents: employer Terms of employment: Salaried employee Hours: full time Onsite: yes Description:*Perform leading edge malware research, analysis (data-mining) and generate content for use in our products *Enhance FireEye’s security content infrastructure, process workflow, and the malware […]

Read more ...


Categories

SATURDAY, APRIL 20, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments