The Angler Exploit Kit (EK) recently added support for an Internet Explorer (IE) vulnerability (CVE-2015-2419) that was patched in July 2015.Read more...
Entries filed under 'Vulnerability'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
July 30, 2015 7:04 AM By Sudeep Singh, Kenneth Hsu | Exploits
May 23, 2015 2:05 PM By Nart Villeneuve, Daniel Regalado | Vulnerabilities
A new variant of Point of Sale (POS) malware, named NitlovePOS, can capture and ex-filatrate track one and track two payment card data.Read more...
April 8, 2015 12:30 PM By Zhaofeng Chen, Yulong Zhang, Hui Xue, Tao Wei
Phantom vulnerability (CVE-2015-1118) leads to multiple UAF issues in libsystem_network.dylib and puts the system into a coma state. In this blog we describe the causes, the symptoms and the solutions of Phantom attacks to protect users from such a threat.Read more...
February 13, 2013 4:28 PM By James T. Bennett