Приклади вживання Fireeye Англійська мовою та їх переклад на Українською
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
General partner: FireEye.
In 2016, FireEye announced that it has been tracking a pair of cybercriminals referred to as the“Vendetta Brothers.”.
On this edition said the analyst, FireEye John Hultquist.
In October/November 2009, FireEye participated in an effort to take down the Mega-D botnet(also known as Ozdok).
In number agreeto abide by the principles also included such companies as Oracle, Symantec, FireEye, HP, Nokia and Spanish Telefonica.
FireEye noted the seizure by the PLA in December 2016 of a Navy unmanned underwater vehicle(UUV) in the South China Sea.
On March 16, 2011, the Rustock botnet was taken down through an action by Microsoft,US federal law enforcement agents, FireEye, and the University of Washington.
In 2017, FireEye detected malicious Microsoft Office RTF documents leveraging a previously undisclosed vulnerability, CVE-2017-0199.
Instead of creating content themselves, we see them amplifying content,” said John Hultquist,the director of intelligence analysis at FireEye Inc.
In July 2012, FireEye was involved in analysis of the Grum botnet's command and control servers located in the Netherlands, Panama, and Russia.
Instead of creating content on our own, we see that they are distributing content," said John Cooltwist,director of analytical analysis at FireEye Inc.
In 2015, the FireEye as a Service team in Singapore uncovered a phishing campaign exploiting an Adobe Flash Player zero-day vulnerability(CVE-2015-3113).
Until now, the group has substantiallyfocused its cyber-espionage efforts on South Korea, but FireEye outlines evidence that it“has expanded its operations in both scope and sophistication”.
USAToday says FireEye"has been called in to investigate high-profile attacks against Target, JP Morgan Chase, Sony Pictures, Anthem and others".
Working as a seamless,scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, world-renowned Mandiant consulting.
FireEye shared the details of the vulnerability with Microsoft and coordinated public disclosure timed with the release of a patch by Microsoft to address the vulnerability.
With this approach, FireEye eliminates the complexity and burden of cybersecurity for organizations struggling to prepare for, prevent, and respond to cyberattacks.
FireEye said the Iranian activity did not appear“dedicated” to influencing the upcoming election, though some of the posts aimed at U.S. users did adopt“left-leaning identities” and took stances against U.S. President Donald Trump.
With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks.
FireEye, a US private security company that tracks cyber-attackers around the world, has identified a North Korean group, which it names APT37(Reaper) and which it says is using malware to infiltrate computer networks.
Another report, issued by the security firm FireEye in July 2015, pointed out that the hackers had seemed to go offline on Russian state holidays, and had appeared to operate during hours consistent with the Russian workday.
In 2015, FireEye confirmed the existence of at least 14 router implants spread across four different countries: Ukraine, Philippines, Mexico, and India.
In 2015, FireEye uncovered an attack exploiting two previously unknown vulnerabilities, one in Microsoft Office(CVE-2015-2545) and another in Windows(CVE-2015-2546).
More than 20 FireEye customers were targeted, including military agencies, law enforcement, defense contractors, media companies and pharmaceutical companies.
In mid-2016, FireEye released a report on the impact of the 2015 agreement between US President Barack Obama and Chinese President Xi Jinping that neither government would“conduct or knowingly support cyber-enabled theft of intellectual property” for an economic advantage.
FireEye said the US-focused activity ramped up last year, just months after Trump took office, with websites and social media accounts posting memes and articles, some of which were apparently copied from legitimate US and Iranian news outlets.