An in-the-wild exploit kit, Magnitude EK, was exploiting a previously unknown vulnerability in Adobe Flash Player and achieving remote code execution on recent versions of Flash Player. Thanks to Adobe's new exploit mitigations, it's now failing.Read more...
Entries filed under 'Exploit'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
March 23, 2016 8:00 AM By Austin Baker | Exploits
Two-factor solutions can be highly effective defensive tools in your fight against advanced attackers when implemented securely. Your overtaxed and understaffed security team is likely already facing 99 other security problems - don’t let two-factor authentication be one.Read more...
March 9, 2016 11:00 AM By Michael Bailey | Exploits
As defensive security controls raise the bar to attack, attackers will employ increasingly sophisticated techniques to complete their mission. Understanding the mechanics and impact of these threats is essential to systematically discover and deflect the coming wave of advanced attacks.Read more...
December 9, 2015 12:00 PM By J. Gomez, Kenneth Hsu, Kenneth Johnson | Exploits
Users who clicked on a URL on the website theguardian[.]com to read an article on cybercrime were silently redirected to the Angler Exploit Kit.