- CES 2025: ZDNET's 25 products that impressed us the most
- How Social Media is Spreading L.A. Misinformation Like Wildfire | McAfee Blog
- I took a 90-second eye exam at CES 2025, and the results were surprisingly accurate
- Thanks to Nvidia, there's a new generation of PCs coming, and they'll be running Linux
- This ultraportable LG tablet that runs on WebOS is my favorite TV at CES 2025
FireEye Breach Detection Guidance – Cisco Blogs
Cyber security firm FireEye recently disclosed an incident that was reported to have resulted in the inadvertent disclosure of various internally developed offensive security tools (OSTs) that were used across FireEye red-team engagements.
Some of these tools appear to be based on well-known offensive frameworks like Cobalt Strike. This is even evident in the naming convention used in the coverage designated by FireEye.
The use of Cobalt Strike beacons is popular among red teams and adversaries. In 2020, Cisco Talos released a research paper detailing the large amount of coverage for the Cobalt Strike framework. We have concluded the coverage is still applicable and can reliably detect FireEye red team beacons and other activity.
Share: