Entries filed under 'Exploits'

Threat Research Blog

The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.

    Flash in 2015

    By Dan Caselden, Genwei Jiang, Corbin Souffrant | Exploits

    The security industry is responding to the increased focus on Flash exploits, but hasn't yet done much to improve detection rates.


    Angler Exploit Kit Using k33nteam’s October Internet Explorer Use After Free

    By Dan Caselden | Exploits
    In 2014, Microsoft introduced heap corruption mitigations into Internet Explorer (IE), such as an isolated heap for certain objects, and a delayed free (collectively referred to as MEMPROTECT). While the mitigations are not unbeatable, they increased the difficulty for exploit authors developing new IE exploits as evidenced by the absence of new IE exploits discovered in the wild. k33nteam demonstrated a method for exploiting  a certain use-after-free (UAF) vulnerability in the presence Read more...

    A Different Exploit Angle on Adobe's Recent Zero-Day

    By Dan Caselden, James T. Bennett, An error has occurred | FireEye

    An error has occurred


    Well that wasn’t supposed to happen. Something went wrong when trying to access this page. Please try again in a few minutes while we’re working on it.

    To send feedback about this error, click here.