FireEye recently detected a malicious Microsoft Office RTF document that leveraged CVE-2017-8759, a SOAP WSDL parser code injection vulnerability.Read more...
Entries filed under 'James T. Bennett'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
June 12, 2017 11:00 AM By James T. Bennett, Barry Vengerik | Threat Research
In this blog we take a closer look at the powerful, versatile backdoor known as CARBANAK (aka Anunak).Read more...
March 8, 2017 12:15 PM By James T. Bennett | Advanced Malware, Threat Research
The FLARE team introduces two small tools to aid in reverse engineering Cocoa applications for macOS, explaining how the Objective-C runtime complicates code analysis in tools such as IDA Pro, and how to find useful entry points into a Cocoa application’s code to begin analysis.
March 19, 2015 7:54 PM By Dan Caselden, James T. Bennett, Corbin Souffrant | Threat Intelligence, Threat Research
The Nuclear Exploit Kit (EK) has incorporated an exploit for the recently patched Adobe Flash CVE-2015-0336.
January 27, 2015 3:42 PM By Dan Caselden, James T. Bennett, Corbin Souffrant | Threat Research, Exploits