Our adversaries are familiar with the RTF format and the inner workings of Microsoft Word, and can devise obfuscation tricks to evade traditional signature-based detection. Understanding hackers perform obfuscation can in turn help us improve our detection of this type of malware.Read more...
Entries filed under 'cyber threat'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
May 12, 2014 2:00 PM By Helena Brito