Our latest report, Overload: Critical Lessons from 15 Years of ICS Vulnerabilities, highlights trends in total ICS vulnerability disclosures, patch availability, vulnerable device type and vulnerabilities exploited in the wild.Read more...
Entries filed under 'Vulnerability'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
May 5, 2016 8:00 AM By Jake Valletta | Vulnerabilities, Threat Research
A vulnerability present on Android devices allows a seemingly benign application to access sensitive user data: including SMS and call history and the ability to perform potentially sensitive actions such as changing system settings or disabling the lock screen.
March 18, 2016 8:30 AM By Kenneth Johnson , J. Gomez | Threat Research, Exploits
Visitors to a Korean news site are being redirected to the GongDa Exploit Kit, which we believe has its origins in China. The EK can compromise vulnerable endpoints, allowing harmful malware to be installed.
December 16, 2015 8:00 AM By Genwei Jiang, Ryann Winters , Dan Caselden | Threat Research
A spear phishing campaign exploits a previously unknown Microsoft vulnerability that had just been patched two weeks earlier.Read more...
August 10, 2015 1:49 PM By Sudeep Singh, Dan Caselden
The Angler Exploit Kit (EK) recently added support for an Internet Explorer (IE) vulnerability (CVE-2015-2419) that was patched in July 2015.Read more...