Machine Learning Versus Memory Resident Evil 5,236 people reacted Machine Learning Versus Memory Resident Evil By Akshata Rao, Esmid Idrizovic, Sujit Rokka Chhetri, Bob Jung and Mark Lim January 31, 2023 at 6:00 AM 4 12 min. read
Chinese PlugX Malware Hidden in Your USB Devices? 21,898 people reacted Chinese PlugX Malware Hidden in Your USB Devices? By Mike Harbison and Jen Miller-Osborn January 26, 2023 at 6:00 AM 12 12 min. read
Navigating the Vast Ocean of Sandbox Evasions 31,923 people reacted Navigating the Vast Ocean of Sandbox Evasions By Esmid Idrizovic, Bob Jung, Daniel Raygoza and Sean Hughes December 27, 2022 at 6:00 AM 8 13 min. read
Meddler-in-the-Middle Phishing Attacks Explained 38,685 people reacted Meddler-in-the-Middle Phishing Attacks Explained By Lucas Hu, Howard Tong, Suiqiang Deng and Alex Starov December 21, 2022 at 6:00 AM 11 10 min. read
Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine 55,045 people reacted Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine By Unit 42 December 20, 2022 at 3:00 AM 32 15 min. read
Blowing Cobalt Strike Out of the Water With Memory Analysis 53,544 people reacted Blowing Cobalt Strike Out of the Water With Memory Analysis By Dominik Reichel, Esmid Idrizovic and Bob Jung December 2, 2022 at 6:00 AM 18 15 min. read
An AI Based Solution to Detecting the DoubleZero .NET Wiper 52,520 people reacted An AI Based Solution to Detecting the DoubleZero .NET Wiper By Akshata Rao, Zong-Yu Wu and Wenjun Hu November 18, 2022 at 6:00 PM 8 7 min. read
Typhon Reborn With New Capabilities 54,214 people reacted Typhon Reborn With New Capabilities By Riley Porter and Uday Pratap Singh November 14, 2022 at 6:00 AM 7 7 min. read
Banking Trojan Techniques: How Financially Motivated Malware Became Infrastructure 60,078 people reacted Banking Trojan Techniques: How Financially Motivated Malware Became Infrastructure By Or Chechik October 31, 2022 at 6:00 AM 12 10 min. read
Defeating Guloader Anti-Analysis Technique 52,588 people reacted Defeating Guloader Anti-Analysis Technique By Mark Lim October 28, 2022 at 6:00 AM 8 5 min. read
Trends in Web Threats in CY Q2 2022: Malicious JavaScript Downloaders Are Evolving 49,221 people reacted Trends in Web Threats in CY Q2 2022: Malicious JavaScript Downloaders Are Evolving By Cecilia Hu, Tao Yan, Jin Chen and Taojie Wang October 26, 2022 at 6:00 AM 8 8 min. read
CNAME Cloaking: Disguising Third Parties Through the DNS 49,329 people reacted CNAME Cloaking: Disguising Third Parties Through the DNS By Rebekah Houser and Daiping Liu October 24, 2022 at 6:00 AM 5 10 min. read
Trends in Web Threats: Old Web Skimmer Still Active Today 46,440 people reacted Trends in Web Threats: Old Web Skimmer Still Active Today By Cecilia Hu, Tao Yan, Zhanhao Chen, Jin Chen and Taojie Wang October 21, 2022 at 6:00 AM 8 9 min. read
Detecting Emerging Network Threats From Newly Observed Domains 49,533 people reacted Detecting Emerging Network Threats From Newly Observed Domains By Zhanhao Chen, Daiping Liu, Wanjin Li and Fan Fei October 17, 2022 at 6:00 AM 7 8 min. read
More Than Meets the Eye: Exposing a Polyglot File That Delivers IcedID 58,778 people reacted More Than Meets the Eye: Exposing a Polyglot File That Delivers IcedID By Mark Lim September 27, 2022 at 6:00 AM 70 4 min. read