Entries filed under 'Joshua Homan'

Threat Research Blog

The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.


    Deobfuscating Python Bytecode

    By Joshua Homan | Advanced Malware

    Learn how to remove a simple obfuscation from a Python code object using the bytecode_graph module.

    Read more...


    A New Word Document Exploit Kit

    By Nart Villeneuve, Joshua Homan | Exploits
    The tools used to create malicious documents that exploit vulnerabilities in Microsoft Word are now being advertised in underground forums and one new tool has emerged that provides the ability to track the effectiveness of campaigns. The builder, Microsoft Word Intruder (MWI), is advertised as an “APT” tool to be used in targeted attacks. It is accompanied by a statistics package known as “MWISTAT” that allows operators to track various campaigns. According Read more...


    A New Word Document Exploit Kit

    By Nart Villeneuve, Joshua Homan | Exploits
    An error has occurred | FireEye

    An error has occurred

     

    Well that wasn’t supposed to happen. Something went wrong when trying to access this page. Please try again in a few minutes while we’re working on it.

    To send feedback about this error, click here.