Emissary Trojan Changelog: Did Operation Lotus Blossom Cause It to Evolve? By Robert Falcone and Jen Miller-Osborn February 3, 2016 at 11:00 AM 2 18 min. read
Scarlet Mimic: Years-Long Espionage Campaign Targets Minority Activists By Robert Falcone and Jen Miller-Osborn January 24, 2016 at 5:00 PM 12 27 min. read
Attack on French Diplomat Linked to Operation Lotus Blossom By Robert Falcone and Jen Miller-Osborn December 18, 2015 at 9:10 AM 4 12 min. read
Connecting the Dots in Cyber Threat Campaigns, Part 1: Domain Name WHOIS Information By Jen Miller-Osborn October 15, 2015 at 3:00 PM 4 4 min. read
Chinese Actors Use ‘3102’ Malware in Attacks on US Government and EU Media By Robert Falcone and Jen Miller-Osborn September 23, 2015 at 3:00 PM 0 9 min. read
Musical Chairs: Multi-Year Campaign Involving New Variant of Gh0st Malware By Brandon Levene, Robert Falcone and Jen Miller-Osborn September 8, 2015 at 12:15 PM 6 8 min. read
Unit 42 Identifies New DragonOK Backdoor Malware Deployed Against Japanese Targets By Jen Miller-Osborn and Josh Grunzweig April 14, 2015 at 1:31 PM 19 8 min. read
Our Favorite Presentations from ShmooCon 2015 By Phil Da Silva and Jen Miller-Osborn January 21, 2015 at 2:00 PM 8 4 min. read
The Question of WireLurker Attribution: Who Is Responsible? By Jen Miller-Osborn November 10, 2014 at 4:00 PM 6 3 min. read
New Indicators of Compromise for APT Group Nitro Uncovered By Jen Miller-Osborn October 3, 2014 at 2:00 PM 3 5 min. read
Recent Watering Hole Attacks Attributed to APT Group “th3bug” Using Poison Ivy By Jen Miller-Osborn and Ryan Olson September 19, 2014 at 3:30 PM 6 4 min. read
Bad Certificate Management in Google Play Store By Zhi Xu and Jen Miller-Osborn August 28, 2014 at 2:00 PM 8 6 min. read
Attacks on East Asia using Google Code for Command and Control By Jen Miller-Osborn August 15, 2014 at 12:00 PM 4 4 min. read