The Angler Exploit Kit (EK) recently added support for an Internet Explorer (IE) vulnerability (CVE-2015-2419) that was patched in July 2015.Read more...
Entries filed under 'Vulnerability'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
July 30, 2015 7:04 AM By Sudeep Singh, Kenneth Hsu | Exploits
May 23, 2015 2:05 PM By Nart Villeneuve, Daniel Regalado | Vulnerabilities
A new variant of Point of Sale (POS) malware, named NitlovePOS, can capture and ex-filatrate track one and track two payment card data.Read more...
April 8, 2015 12:30 PM By Zhaofeng Chen, Yulong Zhang, Hui Xue, Tao Wei
Phantom vulnerability (CVE-2015-1118) leads to multiple UAF issues in libsystem_network.dylib and puts the system into a coma state. In this blog we describe the causes, the symptoms and the solutions of Phantom attacks to protect users from such a threat.Read more...
February 13, 2013 4:28 PM By James T. Bennett