We assess that the actors employing this latest Flash zero-day are a suspected North Korean group we track as TEMP.Reaper.Read more...
Entries filed under 'Vulnerability'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
Attacks Leveraging Adobe Zero-Day (CVE-2018-4878) – Threat Attribution, Attack Scenario and RecommendationsFebruary 2, 2018 9:15 PM By FireEye
August 3, 2016 8:00 AM By Sean McBride, Jeffrey Ashcraft, Nathan Belk | Vulnerabilities
Our latest report, Overload: Critical Lessons from 15 Years of ICS Vulnerabilities, highlights trends in total ICS vulnerability disclosures, patch availability, vulnerable device type and vulnerabilities exploited in the wild.Read more...
May 5, 2016 8:00 AM By Jake Valletta | Vulnerabilities
A vulnerability present on Android devices allows a seemingly benign application to access sensitive user data: including SMS and call history and the ability to perform potentially sensitive actions such as changing system settings or disabling the lock screen.
March 18, 2016 8:30 AM By Kenneth Johnson , J. Gomez | Exploits
Visitors to a Korean news site are being redirected to the GongDa Exploit Kit, which we believe has its origins in China. The EK can compromise vulnerable endpoints, allowing harmful malware to be installed.