Entries filed under 'Red Team'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
July 27, 2016 10:00 AM By Evan Pena, Chris King, Christopher Truncer | Vulnerabilities
The FireEye Red Team creates and modifies tools as a need is identified. Some tools introduce new techniques to accomplish a goal, while others simply automate existing tools and techniques to scale better. This blog discusses some new tools we've developed or significantly contributed to that make our lives easier, and offers some case studies to demonstrate them.
May 5, 2016 8:00 AM By Jake Valletta | Vulnerabilities
A vulnerability present on Android devices allows a seemingly benign application to access sensitive user data: including SMS and call history and the ability to perform potentially sensitive actions such as changing system settings or disabling the lock screen.