It Was Not Me! Malware-Initiated Vulnerability Scanning Is on the Rise 4,882 people reacted It Was Not Me! Malware-Initiated Vulnerability Scanning Is on the Rise By Beliz Kaleli, Fang Liu, Peng Peng, Alex Starov, Joey Allen and Stefan Springer April 8, 2024 at 3:00 PM 22 8 min. read
ASEAN Entities in the Spotlight: Chinese APT Group Targeting 7,308 people reacted ASEAN Entities in the Spotlight: Chinese APT Group Targeting By Unit 42 March 26, 2024 at 1:00 PM 20 5 min. read
Large-Scale StrelaStealer Campaign in Early 2024 8,897 people reacted Large-Scale StrelaStealer Campaign in Early 2024 By Benjamin Chang, Goutam Tripathy, Pranay Kumar Chhaparwal, Anmol Maurya and Vishwa Thothathri March 22, 2024 at 3:00 AM 30 8 min. read
Curious Serpens’ FalseFont Backdoor: Technical Analysis, Detection and Prevention 4,759 people reacted Curious Serpens’ FalseFont Backdoor: Technical Analysis, Detection and Prevention By Tom Fakterman, Daniel Frank and Jerome Tujague March 21, 2024 at 3:00 AM 8 12 min. read
Unit 42 Collaborative Research With Ukraine’s Cyber Agency To Uncover the Smoke Loader Backdoor 3,871 people reacted Unit 42 Collaborative Research With Ukraine’s Cyber Agency To Uncover the Smoke Loader Backdoor By Unit 42 March 19, 2024 at 3:00 AM 19 4 min. read
Inside the Rabbit Hole: BunnyLoader 3.0 Unveiled 6,828 people reacted Inside the Rabbit Hole: BunnyLoader 3.0 Unveiled By Amanda Tanner, Anthony Galiette and Jerome Tujague March 15, 2024 at 3:00 AM 13 16 min. read
The Art of Domain Deception: Bifrost's New Tactic to Deceive Users 7,029 people reacted The Art of Domain Deception: Bifrost's New Tactic to Deceive Users By Anmol Maurya and Siddharth Sharma February 29, 2024 at 3:00 AM 114 6 min. read
Data From Chinese Security Services Company i-Soon Linked to Previous Chinese APT Campaigns 8,802 people reacted Data From Chinese Security Services Company i-Soon Linked to Previous Chinese APT Campaigns By Unit 42 February 23, 2024 at 5:00 PM 26 7 min. read
Intruders in the Library: Exploring DLL Hijacking 4,761 people reacted Intruders in the Library: Exploring DLL Hijacking By Tom Fakterman, Chen Erlich and Assaf Dahan February 22, 2024 at 4:00 PM 12 14 min. read
Diving Into Glupteba's UEFI Bootkit 6,824 people reacted Diving Into Glupteba's UEFI Bootkit By Lior Rochberger and Dan Yashnik February 12, 2024 at 6:00 AM 12 12 min. read
Exploring the Latest Mispadu Stealer Variant 6,365 people reacted Exploring the Latest Mispadu Stealer Variant By Daniela Shalev and Josh Grunzweig February 2, 2024 at 3:00 AM 22 12 min. read
Parrot TDS: A Persistent and Evolving Malware Campaign 7,100 people reacted Parrot TDS: A Persistent and Evolving Malware Campaign By Zhanglin He, Ben Zhang, Billy Melicher, Qi Deng, Bo Qu and Brad Duncan January 19, 2024 at 12:00 PM 36 12 min. read
Financial Fraud APK Campaign 4,879 people reacted Financial Fraud APK Campaign By Chao Lei, Lee Wei Yeong, Zhanhao Chen, Yang Ji, Qi Deng, Royce Lu and Daiping Liu January 12, 2024 at 3:00 AM 37 5 min. read
Tackling Anti-Analysis Techniques of GuLoader and RedLine Stealer 6,153 people reacted Tackling Anti-Analysis Techniques of GuLoader and RedLine Stealer By Mark Lim and Zong-Yu Wu January 5, 2024 at 3:00 AM 33 6 min. read
From DarkGate to AsyncRAT: Malware Detected and Shared As Unit 42 Timely Threat Intelligence 7,549 people reacted From DarkGate to AsyncRAT: Malware Detected and Shared As Unit 42 Timely Threat Intelligence By Samantha Stallings and Brad Duncan December 29, 2023 at 6:00 AM 38 9 min. read