Learn how to remove a simple obfuscation from a Python code object using the bytecode_graph module.Read more...
Entries filed under 'Joshua Homan'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
April 1, 2015 4:17 PM By Nart Villeneuve, Joshua Homan | Threat Research, Exploits
March 24, 2015 8:31 PM By Nart Villeneuve, Joshua Homan | Exploits, Threat Research
A new tool allows cybercriminals to track the effectiveness of their malware campaigns.
November 21, 2014 2:36 PM By Ned Moran, Mike Oppenheim, Mike Scott, Joshua Homan
APT3 (also known as UPS), the actors responsible for Operation Clandestine Fox, has quietly continued to send waves of spearphishing messages over the past few months and has now focused on privilege escalation.Read more...
August 6, 2014 10:04 AM By Ned Moran, Mike Scott, Joshua Homan | Threat Research, Targeted Attack