An in-the-wild exploit kit, Magnitude EK, was exploiting a previously unknown vulnerability in Adobe Flash Player and achieving remote code execution on recent versions of Flash Player. Thanks to Adobe's new exploit mitigations, it's now failing.Read more...
Entries filed under 'Exploit'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
March 23, 2016 8:00 AM By Austin Baker | Exploits, Threat Research
Two-factor solutions can be highly effective defensive tools in your fight against advanced attackers when implemented securely. Your overtaxed and understaffed security team is likely already facing 99 other security problems - don’t let two-factor authentication be one.Read more...
March 9, 2016 11:00 AM By Michael Bailey | Exploits, Threat Research
As defensive security controls raise the bar to attack, attackers will employ increasingly sophisticated techniques to complete their mission. Understanding the mechanics and impact of these threats is essential to systematically discover and deflect the coming wave of advanced attacks.Read more...
December 9, 2015 12:00 PM By J. Gomez, Kenneth Hsu, Kenneth Johnson | Threat Research, Exploits
Users who clicked on a URL on the website theguardian[.]com to read an article on cybercrime were silently redirected to the Angler Exploit Kit.