Learn how to remove a simple obfuscation from a Python code object using the bytecode_graph module.Read more...
Entries filed under 'Joshua Homan'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
April 1, 2015 4:17 PM By Nart Villeneuve, Joshua Homan | Exploits
March 24, 2015 8:31 PM By Nart Villeneuve, Joshua Homan | Exploits
A new tool allows cybercriminals to track the effectiveness of their malware campaigns.
November 21, 2014 2:36 PM By Ned Moran, Mike Oppenheim, Mike Scott, Joshua Homan
APT3 (also known as UPS), the actors responsible for Operation Clandestine Fox, has quietly continued to send waves of spearphishing messages over the past few months and has now focused on privilege escalation.Read more...
August 6, 2014 10:04 AM By Ned Moran, Mike Scott, Joshua Homan | Targeted Attack