We assess that the actors employing this latest Flash zero-day are a suspected North Korean group we track as TEMP.Reaper.Read more...
Entries filed under 'Vulnerability'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
Attacks Leveraging Adobe Zero-Day (CVE-2018-4878) – Threat Attribution, Attack Scenario and RecommendationsFebruary 2, 2018 9:15 PM By FireEye
August 3, 2016 8:00 AM By Sean McBride, Jeffrey Ashcraft, Nathan Belk | Vulnerabilities
Our latest report, Overload: Critical Lessons from 15 Years of ICS Vulnerabilities, highlights trends in total ICS vulnerability disclosures, patch availability, vulnerable device type and vulnerabilities exploited in the wild.Read more...
May 5, 2016 8:00 AM By Jake Valletta | Vulnerabilities
A vulnerability present on Android devices allows a seemingly benign application to access sensitive user data: including SMS and call history and the ability to perform potentially sensitive actions such as changing system settings or disabling the lock screen.
March 18, 2016 8:30 AM By Kenneth Johnson , J. Gomez | Exploits
Visitors to a Korean news site are being redirected to the GongDa Exploit Kit, which we believe has its origins in China. The EK can compromise vulnerable endpoints, allowing harmful malware to be installed.