Exploits kit have become increasingly sophisticated throughout the years. Where obfuscation and new zero days were once the only additions in the development cycle, evasive code is now being embedded into the framework and shellcode.Read more...
Entries filed under 'Raghav Pande'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
February 23, 2016 8:00 AM By Abdulellah Alsaheel , Raghav Pande | Advanced Malware
Microsoft's Enhanced Mitigation Experience Toolkit, EMET, adds security mitigations beyond what's built into the operating system, but attackers are sometimes able to bypass it. We discuss how in this blog.