There is a common annoyance that seems to plague every reverse engineer and incident responder at some point in their career: wasting time or energy looking at junk code.Read more...
Entries filed under 'Code'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
April 22, 2016 11:00 AM By Jonell Baltazar , Joonho Sa | Advanced Malware
The actors behind the Locky ransomware are actively seeking new ways to install their malware on victim computers, and are using a new downloader on the current distribution framework -- which can be a new platform for installing other malware.Read more...
March 22, 2016 8:00 AM By Safwan Khan | Advanced Malware
February 23, 2016 8:00 AM By Abdulellah Alsaheel , Raghav Pande | Advanced Malware
Microsoft's Enhanced Mitigation Experience Toolkit, EMET, adds security mitigations beyond what's built into the operating system, but attackers are sometimes able to bypass it. We discuss how in this blog.