☁️  March 31st Censys Labs presents the latest data around cloud misconfigurations 🌩️ Signup for the webinar

case-study

How FireEye Uses Censys to Fight Adversaries

In this case study, you’ll learn how the FireEye team uses Censys to:

  • Analyze data attributes that they can use to tie together sets of adversary infrastructure used for malware and phishing campaigns
  • Track adversaries based on their behavior and malware trends
  • Discover new suspicious and fraudulent assets that were likely created by attackers
  • Get a handle on attacker attribution, particularly when fighting nation-state attackers

Free Download