FireEye Zero-Day Exploit & Advanced Persistent Threat Protection Systems
  • Get a Demo
  • Customer Support
  • Contact Us
  • FireEye Platform
      • FireEye Platform Overview >
      • Threat Prevention Platform
      • Multi-Vector Virtual Execution engine
      • Read About Advanced Cyber Threats >
      • Why Don't Traditional Defenses Work? >
      • Why FireEye? >
    • White Paper

      Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks

      Protecting Against Advanced Persistent Threats, Advanced Malware

      Guide for CIOs, CFOs, and CISOs on why traditional security defenses are failing and how losing the security battle can hurt your business

      Download >

  • Products & Solutions
      • Threat Prevention Platforms
      • Network Security (NX Series)
      • Email Security (EX Series)
      • Content Security (FX Series)
      • Endpoint Security (HX Series)
      • Cloud-Based Platforms
      • Email Threat Prevention
      • Mobile Threat Prevention
      • Threat Analytics Platform
      • Forensics
      • Network Forensics (PX Series)
      • Forensic Analysis (AX Series)
      • Endpoint Forensics (MIR)
      • Subscriptions and Management
      • Managed Defense
      • Central Management (CM Series)
      • Dynamic Threat Intelligence (DTI)
      • Solutions
      • Data Center
      • Small and Midsize Businesses
      • Industry Solutions
      • Government
      • Pharmaceutical
      • Retail
      • Services
      • Mandiant Services
      • Resources
      • Visio Stencils
    • Webcast

      Product Demo

      View the FireEye Demo

      Inside look at stopping zero-day attacks and advanced persistent threats with FireEye

      View >

  • Info Center
      • Find More Info >
      • Literature
      • Customers
      • Videos
      • Webcasts and Webinars
      • Blog
    • White Paper

      Advanced Targeted Attacks

      Advanced Persistent Threats, Advanced Malware

      Look into the changing nature of today's advanced targeted attacks and why traditional IT security is inadequate

      Download >

  • Partners
      • All About Partners >
      • Fuel Partner Program
      • Fuel Resellers
      • Fuel Solution Providers
      • Fuel Alliance Partners
      • Partner Login Required
      • Partner Enablement - The Fuel Station
      • Partner Portal
      • Education Center
    • White Paper

      Spear Phishing Attacks

      Spear Phishing Attacks: Why They are Successful and How to Stop Them

      Deep dive into spear phishing attacks and what is needed to combat this type of advanced threat

      Download >

  • News & Events
      • Read Latest News >
      • In the News
      • Press Releases
      • Events
      • Blog
    • Video

      The New Threat Landscape

      Advanced Persistent Threats, Advanced Malware

      Insight into how FireEye is able to combat even the most sophisticated threats

      View >

  • Company
      • All About FireEye >
      • Leadership
      • Board of Directors
      • Investor Relations
      • Careers
      • University Relations
      • Contact Us
    • Brochure

      FireEye Corporate Overview

      FireEye is the leader in stopping advanced persistent threats, advanced targeted attacks, and advanced malware

      Overview of the FireEye product family which protects against advanced cyber attacks

      Download >

Blog

Tag Archives: ukraine

Bad Actors Part 5 - UralNet

March 3, 2009 | By Alex Lanstein | Targeted Attack

I'm not actively picking on the Eastern Bloc, but finding purely malicious IP blocks there is duck soup.  In this posting I'll be looking at UralNet, which is registered to an organization in Russia, but appears to be administered out of the Ukraine.

Continue reading »

All Posts
Facebook Twitter LinkedIn RSS

Filter by Category

Resources

Definitive Guide to Next-Generation Threat Protection

White Paper Cover

Comprehensive guide on today's new breed of cyber attacks and how next-generation threat protection can fill the gaps in organizations' network defenses

Download

Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks

White Paper Cover

Guide for CIOs, CFOs, and CISOs on why traditional security defenses are failing and how losing the security battle can hurt your business

Download

YouTube

View more videos »

Twitter

  • Join FireEye on 4/30 & learn how your company can achieve complete threat protection http://t.co/opPxrHPg6O #InfoSec #DFIR Apr. 3 from HootSuite
  • Join FireEye on 4/30 & learn how your company can achieve complete threat protection http://t.co/XrUYkBiHFZ #DFIR #InfoSec Apr. 3 from HootSuite
@fireeye

Facebook

Subscribe to the Blog


FireEye Platform

  • FireEye Platform Overview
  • Today's Advanced Cyber Threats
  • Why Don't Traditional Defenses Work?
  • Why FireEye?

Threat Prevention Platforms

  • NX Series
  • EX Series
  • FX Series
  • HX Series
  • AX Series
  • Mobile Threat Prevention
  • Email Threat Prevention
  • Threat Analytics Platform
  • More Products and Solutions

Info and Resources

  • Info Center
  • Investor Relations
  • Partners
  • News and Events
  • Support
  • About FireEye
  • Legal Terms & Conditions

Connect

  • Blog
  • Twitter
  • Facebook
  • LinkedIn
  • 877.FireEyE (877.347.3393)
  • Request Info

Copyright © 2006-2014 FireEye, Inc. All rights reserved. Privacy & Cookies Policy | Site Map | Site Credits