Entries filed under 'Exploits'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
February 9, 2016 7:00 AM By Tyler Dean | Exploits
This blog post shows the power of using the flare-dbg plug-ins with a debugger to gain insight into how the malware operates at runtime.Read more...
December 28, 2015 9:01 AM By Tyler Dean | Exploits, Threat Research
The latest in the FLARE script series, this blog goes beyond the IDA Pro to look at the debugger scripting interface.Read more...
December 9, 2015 12:00 PM By J. Gomez, Kenneth Hsu, Kenneth Johnson | Threat Research, Exploits
Users who clicked on a URL on the website theguardian[.]com to read an article on cybercrime were silently redirected to the Angler Exploit Kit.
November 13, 2015 1:32 PM By J. Gomez | Threat Research, Exploits
Websites that serve ads are targets for malvertising - online advertisements that quietly redirect to a malicious site when a user clicks on them. Now, a top-ranked ad network is redirecting to the Rig EK.