Background monitoring mobile applications has become a hot topic on mobile devices. Existing reports show that such monitoring can be conducted on jailbroken iOS devices. FireEye mobile...
Read moreBackground monitoring mobile applications has become a hot topic on mobile devices. Existing reports show that such monitoring can be conducted on jailbroken iOS devices. FireEye mobile...
Read moreWrite Once, Exploit Everywhere: FireEye Report Analyzes Four Widely Exploited Java Vulnerabilities
February 21 2014Over the last couple of decades, Java has become the lingua franca of software development, a near-universal platform that works across different operating systems and devices. With...
Read moreWrite Once, Exploit Everywhere: FireEye Report Analyzes Four Widely Exploited Java Vulnerabilities
February 21 2014Over the last couple of decades, Java has become the lingua franca of software development, a near-universal platform that works across different operating systems and devices. With...
Read moreWrite Once, Exploit Everywhere: FireEye Report Analyzes Four Widely Exploited Java Vulnerabilities
February 21 2014Over the last couple of decades, Java has become the lingua franca of software development, a near-universal platform that works across different operating systems and devices. With...
Read moreWrite Once, Exploit Everywhere: FireEye Report Analyzes Four Widely Exploited Java Vulnerabilities
February 21 2014Over the last couple of decades, Java has become the lingua franca of software development, a near-universal platform that works across different operating systems and devices. With...
Read moreOperation GreedyWonk: Multiple Economic and Foreign Policy Sites Compromised, Serving Up Flash Zero-Day Exploit
February 20 2014Less than a week after uncovering Operation SnowMan, the FireEye Dynamic Threat Intelligence cloud has identified another targeted attack campaign — this one exploiting a zero-day...
Read moreOperation GreedyWonk: Multiple Economic and Foreign Policy Sites Compromised, Serving Up Flash Zero-Day Exploit
February 20 2014Less than a week after uncovering Operation SnowMan, the FireEye Dynamic Threat Intelligence cloud has identified another targeted attack campaign — this one exploiting a zero-day...
Read moreOperation GreedyWonk: Multiple Economic and Foreign Policy Sites Compromised, Serving Up Flash Zero-Day Exploit
February 20 2014Less than a week after uncovering Operation SnowMan, the FireEye Dynamic Threat Intelligence cloud has identified another targeted attack campaign — this one exploiting a zero-day...
Read moreGoing To Ground with The Windows Scripting Host (WSH)
February 19 2014About a month ago, I was involved in an investigation that revealed a targeted attacker using an interesting variation of a well-known ...
Read more
Recent Comments