It Was Not Me! Malware-Initiated Vulnerability Scanning Is on the Rise 5,901 people reacted It Was Not Me! Malware-Initiated Vulnerability Scanning Is on the Rise By Beliz Kaleli, Fang Liu, Peng Peng, Alex Starov, Joey Allen and Stefan Springer April 8, 2024 at 3:00 PM 30 8 min. read
ASEAN Entities in the Spotlight: Chinese APT Group Targeting 7,787 people reacted ASEAN Entities in the Spotlight: Chinese APT Group Targeting By Unit 42 March 26, 2024 at 1:00 PM 21 5 min. read
Large-Scale StrelaStealer Campaign in Early 2024 9,230 people reacted Large-Scale StrelaStealer Campaign in Early 2024 By Benjamin Chang, Goutam Tripathy, Pranay Kumar Chhaparwal, Anmol Maurya and Vishwa Thothathri March 22, 2024 at 3:00 AM 30 8 min. read
Curious Serpens’ FalseFont Backdoor: Technical Analysis, Detection and Prevention 5,050 people reacted Curious Serpens’ FalseFont Backdoor: Technical Analysis, Detection and Prevention By Tom Fakterman, Daniel Frank and Jerome Tujague March 21, 2024 at 3:00 AM 8 12 min. read
Unit 42 Collaborative Research With Ukraine’s Cyber Agency To Uncover the Smoke Loader Backdoor 4,074 people reacted Unit 42 Collaborative Research With Ukraine’s Cyber Agency To Uncover the Smoke Loader Backdoor By Unit 42 March 19, 2024 at 3:00 AM 19 4 min. read
Inside the Rabbit Hole: BunnyLoader 3.0 Unveiled 7,106 people reacted Inside the Rabbit Hole: BunnyLoader 3.0 Unveiled By Amanda Tanner, Anthony Galiette and Jerome Tujague March 15, 2024 at 3:00 AM 13 16 min. read
The Art of Domain Deception: Bifrost's New Tactic to Deceive Users 7,250 people reacted The Art of Domain Deception: Bifrost's New Tactic to Deceive Users By Anmol Maurya and Siddharth Sharma February 29, 2024 at 3:00 AM 114 6 min. read
Data From Chinese Security Services Company i-Soon Linked to Previous Chinese APT Campaigns 9,155 people reacted Data From Chinese Security Services Company i-Soon Linked to Previous Chinese APT Campaigns By Unit 42 February 23, 2024 at 5:00 PM 27 7 min. read
Intruders in the Library: Exploring DLL Hijacking 5,176 people reacted Intruders in the Library: Exploring DLL Hijacking By Tom Fakterman, Chen Erlich and Assaf Dahan February 22, 2024 at 4:00 PM 14 14 min. read
Diving Into Glupteba's UEFI Bootkit 7,136 people reacted Diving Into Glupteba's UEFI Bootkit By Lior Rochberger and Dan Yashnik February 12, 2024 at 6:00 AM 12 12 min. read
Exploring the Latest Mispadu Stealer Variant 6,518 people reacted Exploring the Latest Mispadu Stealer Variant By Daniela Shalev and Josh Grunzweig February 2, 2024 at 3:00 AM 22 12 min. read
Parrot TDS: A Persistent and Evolving Malware Campaign 7,358 people reacted Parrot TDS: A Persistent and Evolving Malware Campaign By Zhanglin He, Ben Zhang, Billy Melicher, Qi Deng, Bo Qu and Brad Duncan January 19, 2024 at 12:00 PM 36 12 min. read
Financial Fraud APK Campaign 5,039 people reacted Financial Fraud APK Campaign By Chao Lei, Lee Wei Yeong, Zhanhao Chen, Yang Ji, Qi Deng, Royce Lu and Daiping Liu January 12, 2024 at 3:00 AM 37 5 min. read
Tackling Anti-Analysis Techniques of GuLoader and RedLine Stealer 6,303 people reacted Tackling Anti-Analysis Techniques of GuLoader and RedLine Stealer By Mark Lim and Zong-Yu Wu January 5, 2024 at 3:00 AM 33 6 min. read
From DarkGate to AsyncRAT: Malware Detected and Shared As Unit 42 Timely Threat Intelligence 7,719 people reacted From DarkGate to AsyncRAT: Malware Detected and Shared As Unit 42 Timely Threat Intelligence By Samantha Stallings and Brad Duncan December 29, 2023 at 6:00 AM 38 9 min. read