Check out the cool prizes from this year’s LabyREnth CTF Challenge.
Congratulations to this year’s LabyREnth CTF winners!
It’s the final week! Have you completed Unit 42’s LabyREnth CTF challenge?
Have you escaped the LabyREnth? Tips, tricks and clues to make your escape.
LabyREnth CTF 2017: the challenge starts now!
Are you ready? We’re one week away from Unit 42’s second LabyREnth CTF challenge!
Did you find our teaser on the LabyREnth countdown page? Don’t worry, we have all the info you need right here.
Brace yourselves. A new Unit 42 Capture the Flag (CTF) challenge is coming on June 9, 2017.
Thanks to the incredibly talented community of threat researchers that participated in LabyREnth, the Unit 42 Capture the Flag (CTF) challenge. Now that the challenge is closed, we can finally reveal the solutions of each challenge track. We’ll be rolling out the solutions for one challenge track per week. Next up, the Unix track.
Congratulations to those who solved an introductory challenge hidden in our initial LabyREnth announcement! If you decode the binary in the Palo Alto Networks logo on http://labyrenth.com, you get the following ascii message: “For reals yall. Has anyone really been far as decided to use XOR even go want to do look more like? You’ve
The Upatre family of malware is frequently updated, with the authors adding new features and protecting the malware from detection in various ways. If you aren’t yet familiar with Upatre, it’s one of the most common downloaders in the wild today, typically infecting systems through phishing e-mails and downloading the Dyre banking Trojan to steal
A June 23 FireEye blog post titled “Operation Clandestine Wolf” discussed a cyber espionage group, known as APT3, that had been exploiting a zero-day vulnerability in Adobe Flash. Unit 42 also tracks the APT3 group using the name UPS, which is an intrusion set with Chinese origins that is known for having early access to
Executive Summary Unit 42 has uncovered a new campaign from the CozyDuke threat actors, aka CozyCar , leveraging malware that appears to be related to the Seaduke malware described earlier this week by Symantec.  This campaign, which began on July 7, 2015, appears to be targeted at government organizations and think-tanks located in democratic