On June 27, 2017, multiple organizations – many in Europe – reported significant disruptions they are attributing to a variant of the Petya ransomware, which we are calling “EternalPetya”.Read more...
Entries filed under 'Exploit'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
June 2, 2017 9:00 AM By Ali Islam, Barry Vengerik, Zain Gardezi , Christopher Glyer, Haroon W Malik | Threat Research, Advanced Malware
May 26, 2017 11:00 AM By Ali Islam, Nicole Oppenheim, Winny Thomas | Threat Research
The recent WannaCry ransomware takes advantage of a Server Message Block vulnerability to compromise Windows machines, load malware, and propagate to other machines in a network.Read more...
July 14, 2016 4:37 PM By Kenneth Johnson , Yasir Khalid, Dan Caselden, Sai Omkar Vashisht | Exploits, Threat Research
The Neutrino EK adopted an open-source exploit and now uses it to embed multiple exploits into a SWF file.
January 14, 2010 3:22 PM By Julia Wolf