Login or sign up Lost password?
Login or sign up
In a new report from Fire Eye*, Fire Eye researchers analyze the nature of malicious files cybercriminals distribute in order to bypass traditional security defenses and identify several trends - including the most common words in file names and file extensions used in spear phishing attacks.