Hi [[ session.user.profile.firstName ]]

APT33: New Insights into Iranian Cyber Espionage Group

Recent investigations by FireEye’s Mandiant incident response consultants combined with FireEye iSIGHT Threat Intelligence analysis have given us a more complete picture of a suspected Iranian threat group, that we believe has been operating since at least 2013. 
 
Join us in a live webinar as we discuss this threat group whom we asses to be involved in a long-term, resource intensive cyber espionage operation motivated by the prospect of collecting strategic intelligence, including information related to the aviation and energy industries, which would ultimately benefit a nation-state or military sponsor.
 
Register today to gain deeper insights into this threat group!
Recorded Sep 21 2017 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Stuart Davis, Director, Mandiant; Nick Carr, Senior Manager, TORE Detection & Analysis
Presentation preview: APT33: New Insights into Iranian Cyber Espionage Group
  • Channel
  • Channel profile
  • How FireEye Protects FireEye Jun 20 2019 4:00 pm UTC 60 mins
    Matt Shelton, Director, Risk & Threat Intelligence & Risk Management
    FireEye relentlessly protects its customers. But who protects FireEye? Join us for an overview of how FireEye uses its own products and services to protect itself from the same threats faced by customers.

    In this webinar, Matt Shelton, FireEye Director of Technology Risk and Threat Intelligence, will reveal how FireEye:

    •Uses threat intelligence to proactively protect the organization
    •Detects threats using FireEye Network Security products
    •Responds to incidents with FireEye Endpoint Security
    •Leverages Helix as its security operations platform
    •Hunts for known and unknown threats within its environment.
  • Top 5 Cloud Security Myths Debunked Jun 20 2019 1:00 pm UTC 55 mins
    Martin Holste, Cloud CTO, FireEye
    Through 2022, at least 95% of cloud security failures are predicted to be the customer’s fault (Gartner). But change how you think about cloud security, and you can be a success story.

    Join our webinar, which helps debunk several common myths that jeopardize your fast, secure, migration to the cloud:

    • The cloud is unsafe
    • My organization doesn’t use the cloud
    • My cloud provider will keep me secure
    • The cloud is just someone else’s computer
    • Advanced adversaries aren’t attacking the cloud

    You’ll also learn how to identify a trusted advisor for cloud migration so you can confidently take advantage of cloud advancements.


    Presented by: Martin Holste, Cloud CTO at FireEye
  • Help, my users have been hacked! What happened and how do I respond? Jun 20 2019 10:00 am UTC 45 mins
    Vinoo Thomas, Product Line Manager, FireEye
    A Breach Investigation Scenario Leveraging FireEye Endpoint Security

    FireEye spends thousands of hours annually investigating the world’s most impactful security breaches - you don’t have to stand alone when this happens to you. In this webinar, we will use a real-life scenario to dive deeper into how breaches are discovered and importantly, what security lessons can be learned.

    Join FireEye’s Vinoo Thomas as we take a closer look at the discovery of credential harvesting and multiple compromised clients from a single compromised endpoint. Learn how investigation can be used to find and contain the impact of a breach in nearly any environment.
  • A Review of Cyber Resilience -- Past, Present, and Future Jun 20 2019 6:00 am UTC 60 mins
    To be advised
    Rapidly evolving threats and infiltration techniques have rendered traditional cyber defense strategies insufficient and ineffective. The emerging threat vectors and speed of change amplified by the digital transformation cannot be addressed by traditional means. Globally, laws are also changing to keep pace as cybercrime evolves, knowing no boundaries. Therefore, organizations must be nimble and agile to keep pace with policy changes, especially when expanding across different jurisdictions

    Join us as we discuss three strategic imperatives to strengthen cyber resilience:
    • Understand (know your threats) – Identify organization- and industry-specific cyber threats and regulations calls for robust strategies that include cross-disciplinary considerations.
    • Measure (know yourself) – Quantify the potential financial impact of cyber exposures to compare against the level of risk appetite acceptable to the board. This will determine the amount of investment necessary to mitigate and transfer any residual risk.
    • Manage (know what you can do) – Proactively manage cyber risks by having clear action plans based on your capabilities and capacities to protect against cyber criminals.

    While cyber-attacks are inevitable, proper preparation is the essential element that sets resilient organizations apart from the rest in managing risk, minimizing damage, and recovering quickly from any incidents.
  • The Cyber Skills Gap: A Practitioner’s Perspective Jun 19 2019 6:00 pm UTC 60 mins
    Stanley Parret, Principal Consultant, FireEye Managed Defense
    The shortage of cybersecurity workers is a growing concern for the teams who are directly responsible for protecting the organization against cyber threats. It’s estimated that by 2021, 3.5 million cyber security positions will go unfilled.

    Join Stanley Parret, Principal Consultant for FireEye Managed Defense, for a look at the unforeseen challenges and consequences of the growing cyber skills gap, especially around protecting against advanced threats. In this webinar, we’ll discuss:

    -The impact of staffing shortages on security practitioners
    -How they’re being required to protect more with less
    -The options available to security teams who need to extend their capacity

    Register now for the webinar
  • Simplifying Security Operations with ONE Platform Jun 19 2019 4:00 pm UTC 60 mins
    Ben Forster, Sr. Product Marketing Manager, FireEye
    Managing security operations is a challenge, and the technologies most organizations are using don’t provide the visibility, detection efficacy, or context they need. As their risk profile expands, organizations rely on hiring more analysts and purchasing more tools, often depending on manual processes to find and mitigate threats. The high volume of alert noise strains security teams’ resources and increases the probability they will miss an alert that matters. Organizations need a single solution that centralizes their security management, provides visibility, and allows them to quickly respond to threats with automation.

    In this webinar:
    - Understand the benefits of technology consolidation
    - Learn about what a single platform can do for your people and processes
    - Discover the untapped potential of your security investments
  • How To Train Your Email Security Dragon Jun 19 2019 1:00 pm UTC 45 mins
    Gareth Fraser-King, Director, Product Marketing EMEA
    The numbers make stark reading. 281 billion emails sent daily to over 2 billion business users. 91% of all cyber-attacks start with an email and it only takes 1 with malicious intent to impact your organisation. With evolving methods used by the adversary, it’s becoming increasingly difficult not to get burned.

    Join Gareth Fraser-King, Director, Product Marketing EMEA, to learn:
    - The state of the cyber landscape, specific to email security.
    - How the attack vector is changing with new tactics, techniques, procedures and what you need to look out for.
    - Why is FireEye better at catching evolving attacks and how this can benefit you.
  • Using Risk Management to Optimize Cybersecurity Costs Jun 18 2019 3:00 pm UTC 60 mins
    Matt Keane, Senior Director, Risk Management Services – FireEye Mandiant
    Using Risk Management to Optimize Cybersecurity Costs: Best Practices for the C-Suite

    Cyber risk management is increasingly becoming a strategic priority for executive leaders worldwide, though many organizations find it challenging to accurately anticipate, prioritize, and forecast risk mitigation costs.

    C-level executives can meet these challenges by engaging their boards and their security teams to ensure they have the right data to scope risk-based focus areas. This allows the organization to plan effectively while keeping necessary security investments top of mind.

    Join this webinar with Matt Keane, FireEye Mandiant Senior Director of Risk Management Services, as he explains how to:

    • Identify the top risks to your organization based on threat intelligence—and communicate these trends to your board of directors in a way they’ll hear
    • Ensure that the board’s security investment decisions support your organization’s appetite for risk
    • Establish a framework that ensures the alignment of strategic priorities with security spending
    • Track the right risk performance metrics to monitor changes in your unique risk profile, so that you can shift priorities and spending when needed
    • Apply these lessons to a sample business scenario.

    Register for this webinar to learn how executives like yourself can effectively implement these cyber risk management practices today.
  • APT Groups: How They Think, What They Want, and How to Fight Them Jun 18 2019 9:30 am UTC 60 mins
    David Grout, CTO, EMEA, FireEye
    Like most cyber criminals, advanced persistent threat (APT) groups try to steal data, disrupt operations, and destroy infrastructure. But unlike other attackers, APT attackers pursue their objectives over months or even years, adapting to defenses and frequently retargeting the same victim.

    Join this webinar to hear David Grout, FireEye EMEA Chief Technology Officer explain how effective cyber threat intelligence (CTI) helps you understand APT groups’ intents and tactics so you can stay ahead of attacks, instead of just reacting to them. He’ll also provide:

    •A high-level overview of the nation-state interests driving APT activity
    •Insight into the most recent APT attacks investigated by FireEye
    •A deep dive into the workings of APT40, a Chinese cyber espionage group that typically targets countries and organizations strategically important to the country’s “Belt and Road Initiative.”
  • A Red Team Case Study Jun 18 2019 6:00 am UTC 60 mins
    Steve Ledzian, Vice President & Chief Technology Officer, APAC, FireEye
    Red Team assessments help organizations identify weaknesses in their current detection and response procedures so they can update their existing security programs to better deal with modern threats. We'll look at a red team case study detailed in FireEye's MTrends 2019 report where consultants performed an objective-based assessment that emulated a real cyber attack of an advanced, nation state attacker across the entire attack lifecycle
  • Threat Intelligence on the Frontlines Jun 18 2019 2:00 am UTC 60 mins
    Tavis Newsome, Senior Intelligence Optimisation Analyst, FireEye
    Today, defeating cyber attackers and the techniques they employ requires real-time insight and intelligence. Staying ahead of attacks, instead of merely reacting, is the heart of cyber threat intelligence. To illustrate the importance of these capabilities to both public and private sector organizations, Tavis will draw from recent real-world intelligence findings, such as FireEye’s collaboration with Facebook and Google to identify Iranian government influence campaigns, as well as our identification of North Korean state-sponsored groups targeting the energy sector.
  • ​Email-alapú támadások: nincs minden veszve! Jun 4 2019 8:00 am UTC 45 mins
    ​Istvan Nemeth, CTO Biztributor
    Folyamatosan emelkedik a célzott phishing támadások száma – mert működnek. A közelmúltban gyors és drámai váltást láthattunk a hagyományos széles spam támadások felől a célzott, email-alapú phishing támadások felé. E támadások már jelentős pénzügyi, működési és márka-károkat okoznak a szervezetnek világszerte.

    A közelmúlt leghírhedtebb kibertámadásai – beleértve a múlt heti Binance-támadást is – úgy kezdődtek, hogy valaki egy spear-phishing emailre kattintott. A sikeres spear-phishing támadások átlagos költsége: 1,6 millió dollar.

    Nézd meg az elő webinart, amelyben a biztributor CTO-ja, Német István veszi át a támadási vektor főbb jellemzőit és a modern védelmi mechanizumusokat. A témából:
    -email-alapú támadások trendjei
    -új típusú fenyegetések
    -a FireEye Email Security egyedi megközelítése
    -best practice-ek, tanulságok éstapasztalatok
  • Defensive Security Techniques You Can Use Now Recorded: May 22 2019 60 mins
    Nick Bennett, Director, FireEye Mandiant & Matt McWhirt, Sr. Manager, FireEye Mandiant
    Many organizations struggle with how to prioritize hardening and protective security actions.

    Based on 15+ years of frontline incident response experience, FireEye Mandiant consultants have identified a number of technical and programmatic defensive trends and best practices to help you prepare for incidents and mitigate their impact.

    Join our webinar, where Mandiant incident response experts Nick Bennett and Matt McWhirt will discuss the following topics:

    • Five technical categories to consider when implementing preventative security
    • Proven tips to effectively execute network segmentation, endpoint hardening and other critical tasks
    • Common pitfalls in evidence destruction, investigation techniques and remediation timing
    • Recommendations for enabling effective remediation and the power of operational playbooks

    Register today to learn how to better handle your organization’s next security incident.
  • A 360-Degree View of the Latest APT Groups Recorded: Apr 18 2019 58 mins
    Fred Plan, Sr. Threat Intel Analyst, FireEye
    FireEye analysts work to identify cyber espionage trends and gather the evidence needed to name APT groups.

    The most recently named groups—APT38, APT39, APT40—exemplify the variety of state-sponsored threats that network defenders face today: a North Korean operator specializing in bank heists, an Iranian group tracking personal data and specific individuals and a long-established Chinese actor shifting its targeting to reflect changing geopolitics.

    In this webinar, Fred Plan, Sr. Threat Intelligence Analyst at FireEye provides:

    • A high-level overview on how nation-state interests are driving APT activity
    • Insight into the most recent APT groups investigated by FireEye
    • The latest adversary tactics, techniques and procedures (TTPs) these groups use

    Register NOW for the live webinar
  • Tendances et méthodes derrière les dernières cyberattaques d’aujourd’hui Recorded: Apr 11 2019 48 mins
    David Grout, EMEA CTO, FireEye
    Explorez les dernières innovations utilisées par les groupes d’attaquants, leurs méthodes et motivations dans notre rapport M-Trends 2019; rapport annuel publié par nos équipes d’investigations et de réponse à Incidents Mandiant sur les cyberattaques les plus conséquentes de l’année.

    Rejoignez-nous au webinaire durant lequel les experts Mandiant de FireEye discutent des faits principaux et des études de cas de l'édition de cette année, notamment:

    Nouveaux groupes d’attaquants et APT émergés en 2018
    •L’évolution du cyber espionnage en Corée du Nord, Russie, Chine et en Iran.
    •Pourquoi la phrase ‘Ciblé une fois, toujours ciblé’ est plus vraie que jamais
    •Les risques de phishing lors d’activités de fusion et d’acquisitions
    •Des cas d’usages et retour clients par régions
    •Les meilleures pratiques tirées de l’expérience de nos équipes en front line sur des interventions cybers
    S’inscrire au webinaire MAINTENANT
  • M-Trends 2019: quali trend dietro un attacco Cyber Recorded: Apr 10 2019 48 mins
    Marco Riboli, VP, Southern Europe, FireEye; Gabriele Zanoni, Sales Engineer, FireEye
    Scopri quali sono le tecniche più utilizzate, i comportamenti e le motivazioni degli attaccanti di oggi nel Report M-Trends 2019, la nostra pubblicazione annuale basata sulle investigazioni condotte dai consulenti Mandiant, società di FireEye, sugli attacchi informatici che hanno avuto il maggior impatto nel 2018.

    Partecipa al webinar durante il quale i nostri esperti, sulla base dell’esperienza Mandiant, azienda di FireEye, evidenzieranno le novità e i casi studio di quest’ultima edizione, in particolare:
    • Evoluzione dei trend d’attacco nell’attuale panorama delle minacce cyber
    • Nuovi gruppi APT identificati nel 2018
    • Rischi di phishing nascosti durante operazioni di fusione e acquisizione (M&A)
    • Casi di compromissioni reali
    • Best practice basate sull’esperienza diretta degli esperti di incident response

    Registrati al webinar ORA!
  • M-Trends: Erkenntnisse aus einem Jahrzehnt an der Spitze der Cybersicherheit Recorded: Apr 9 2019 48 mins
    Rüdiger Weyrauch, Director Sales Engineering Central & Eastern Europe, FireEye
    Im Jahr 2018 entwickelte sich die Cybersicherheitsbranche auf eine Weise, die sowohl erwartet als auch überraschend war. Die Zeit, bis Opfer den Angriff bemerkten (Verweildauer), verkürzte sich deutlich – aber neue, aggressive Angreifer wurden aktiv.

    Erfahren Sie welche aktuellen Trends in der Cyber Security Welt zu sehen sind. Auf Basis des M-Trends 2019 Reports werden wir über Statistiken und Trends bei APT-Gruppen berichten sowie vorausschauende Schutzmaßnahmen vorstellen.

    Profitieren Sie von einem tiefen Einblick:

    •Neue Angreifergruppen (APT), die 2018 aufgedeckt wurden
    •Die Entwicklung von Cyber-Spionage-Teams in Nordkorea, Russland, China und dem Iran
    •Warum "einmal ein Ziel, immer ein Ziel" mehr denn je wahr ist
    •Risiken durch versteckte Phishing-Angriffe bei Fusionen und Übernahmen
    •Regionale Fallstudien über erfolgte Angriffe
  • Lessons from a decade on the frontlines of cyber security | EMEA Spotlight Recorded: Mar 28 2019 49 mins
    Stuart McKenzie, EMEA VP, FireEye Mandiant & Alister Shepherd, META Director Consulting
    Explore the latest developments behind today’s attacker techniques, behaviors, and motivations sourced from this year’s M-Trends 2019 Report, our annual publication based on FireEye Mandiant’s frontline investigations of the most interesting and impactful cyber attacks in 2018.

    This year will mark the 10th anniversary of M-Trends, giving us the perfect opportunity to a decade’s worth of cyber security developments.

    Join us for this webinar, as FireEye Mandiant experts discuss highlights and case studies from this year’s edition, including:

    • Evolving attack trends in today’s threat landscape
    • New advanced persistent threat (APT) groups that emerged in 2018
    • Regional case studies of real-world compromises
    • Best practices lessons learned from the front lines of incident response
  • Otwórz. Kliknij. Daj się zhakować Recorded: Mar 26 2019 41 mins
    Marcin Kacprzak, Senior Sales Engineer & Damian Hoffman, Senior Sales Engineer
    Kliknąć, czy nie? Każdego dnia użytkownicy poczty elektronicznej zadają sobie podobne pytanie. Wg najnowszych statystyk 1 na 101 wszystkich wiadomości email zawiera złośliwą treść, która może prowadzić do infekcji zarówno pojedynczego komputera, jak i całej organizacji.

    Podczas naszego webinarium dowiesz się jak wykrywać i blokować podejrzane wiadomości email oraz poznasz szczegóły efektywnej strategii ochrony poczty elektronicznej przed takimi atakami jak:
    ·Spear phishing
    ·Impersonation
    ·W2 Scam
  • The Email Security Goal: ONE Single Solution Recorded: Mar 19 2019 50 mins
    Ken Bagnall, Vice President, Email Security, FireEye, moderated by Christopher Porter, Chief Intelligence Strategist, FireEye
    FireEye research recently indicated that an average of 14 thousand malicious emails per month were being missed by most email security solutions. Email is the number one threat vector and with impersonation and credential phishing or URL-based attacks on the rise your email security solution must keep up with the evolving threat landscape. In this webinar:

    -Get a brief overview on the latest email threat trends
    -Learn about the must haves for email security solutions and the benefits of having one provider
    -Find out about additional email security capabilities that can help you have an adaptable solution
    -Hear about a use case where FireEye helped detect and block impersonation techniques that the incumbent solution missed
Technology, Intelligence and Expertise
FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 7,700 customers across 67 countries, including more than 50 percent of the Forbes Global 2000.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: APT33: New Insights into Iranian Cyber Espionage Group
  • Live at: Sep 21 2017 12:00 pm
  • Presented by: Stuart Davis, Director, Mandiant; Nick Carr, Senior Manager, TORE Detection & Analysis
  • From:
Your email has been sent.
or close