In May of 2016, Mandiant’s Red Team discovered a series of vulnerabilities present on Lenovo’s Vibe P1 Android-based mobile device that allow local privilege escalation to the user “root”.Read more...
Entries filed under 'vulnerabilities'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
August 3, 2016 8:00 AM By Sean McBride, Jeffrey Ashcraft, Nathan Belk | Threat Research, Vulnerabilities
Our latest report, Overload: Critical Lessons from 15 Years of ICS Vulnerabilities, highlights trends in total ICS vulnerability disclosures, patch availability, vulnerable device type and vulnerabilities exploited in the wild.Read more...
May 5, 2016 8:00 AM By Jake Valletta | Threat Research, Vulnerabilities
A vulnerability present on Android devices allows a seemingly benign application to access sensitive user data: including SMS and call history and the ability to perform potentially sensitive actions such as changing system settings or disabling the lock screen.
March 18, 2016 8:30 AM By Kenneth Johnson , J. Gomez | Exploits, Threat Research
Visitors to a Korean news site are being redirected to the GongDa Exploit Kit, which we believe has its origins in China. The EK can compromise vulnerable endpoints, allowing harmful malware to be installed.