What does it take to analyze malware? Who figures out where it comes from and how to stop it? This podcast examines those questions and more.Read more...
Entries filed under 'Reverse Engineering'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
May 3, 2016 8:30 AM By Joshua Homan | Advanced Malware
Learn how to remove a simple obfuscation from a Python code object using the bytecode_graph module.Read more...
February 9, 2016 7:00 AM By Tyler Dean | Exploits
This blog post shows the power of using the flare-dbg plug-ins with a debugger to gain insight into how the malware operates at runtime.Read more...
September 8, 2015 10:56 AM By Nick Harbour | Exploits
The 2015 FLARE-ON challenge was a massive success, with a total of 1,408 active participants. We consider active participants as those who solved one or more challenges. Read on to learn about the challenge and the solutions!