We are sharing a new IDAPython library that provides scriptable emulation features to reverse engineers.Read more...
Entries filed under 'James T. Bennett'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
September 12, 2017 1:00 PM By Genwei Jiang, James T. Bennett, Ben Read
FireEye recently detected a malicious Microsoft Office RTF document that leveraged CVE-2017-8759, a SOAP WSDL parser code injection vulnerability.Read more...
June 12, 2017 11:00 AM By James T. Bennett, Barry Vengerik
In this blog we take a closer look at the powerful, versatile backdoor known as CARBANAK (aka Anunak).Read more...
March 8, 2017 12:15 PM By James T. Bennett | Advanced Malware
The FLARE team introduces two small tools to aid in reverse engineering Cocoa applications for macOS, explaining how the Objective-C runtime complicates code analysis in tools such as IDA Pro, and how to find useful entry points into a Cocoa application’s code to begin analysis.