Why Is an Australian Footballer Collecting My Passwords? The Various Ways Malicious JavaScript Can Steal Your Secrets 5,394 people reacted Why Is an Australian Footballer Collecting My Passwords? The Various Ways Malicious JavaScript Can Steal Your Secrets By Billy Melicher, Nabeel Mohamed and Alex Starov December 20, 2023 at 3:00 AM 37 9 min. read
Toward Ending the Domain Wars: Early Detection of Malicious Stockpiled Domains 5,560 people reacted Toward Ending the Domain Wars: Early Detection of Malicious Stockpiled Domains By Janos Szurdi, Shehroze Farooqi and Nabeel Mohamed December 15, 2023 at 3:00 PM 34 13 min. read
New Tool Set Found Used Against Organizations in the Middle East, Africa and the US 12,821 people reacted New Tool Set Found Used Against Organizations in the Middle East, Africa and the US By Chema Garcia December 1, 2023 at 3:00 AM 49 14 min. read
Hacking Employers and Seeking Employment: Two Job-Related Campaigns Bear Hallmarks of North Korean Threat Actors 19,499 people reacted Hacking Employers and Seeking Employment: Two Job-Related Campaigns Bear Hallmarks of North Korean Threat Actors By Unit 42 November 21, 2023 at 6:00 AM 123 17 min. read
Stately Taurus Targets the Philippines As Tensions Flare in the South Pacific 9,195 people reacted Stately Taurus Targets the Philippines As Tensions Flare in the South Pacific By Unit 42 November 17, 2023 at 3:00 AM 93 6 min. read
Conducting Robust Learning for Empire Command and Control Detection 3,371 people reacted Conducting Robust Learning for Empire Command and Control Detection By Qian Feng, Chris Navarrete, Yanhui Jia, Yu Fu, Iris Dai, Nina Smith and Brad Duncan November 1, 2023 at 3:00 AM 16 10 min. read
Over the Kazuar’s Nest: Cracking Down on a Freshly Hatched Backdoor Used by Pensive Ursa (Aka Turla) 8,211 people reacted Over the Kazuar’s Nest: Cracking Down on a Freshly Hatched Backdoor Used by Pensive Ursa (Aka Turla) By Daniel Frank and Tom Fakterman October 31, 2023 at 6:00 AM 14 20 min. read
When PAM Goes Rogue: Malware Uses Authentication Modules for Mischief 5,892 people reacted When PAM Goes Rogue: Malware Uses Authentication Modules for Mischief By Siddharth Sharma October 26, 2023 at 6:00 AM 63 4 min. read
Blocking Dedicated Attacking Hosts Is Not Enough: In-Depth Analysis of a Worldwide Linux XorDDoS Campaign 6,387 people reacted Blocking Dedicated Attacking Hosts Is Not Enough: In-Depth Analysis of a Worldwide Linux XorDDoS Campaign By Zhanhao Chen, Chao Lei, Fang Liu, Yang Ji, Qi Deng, Royce Lu and Daiping Liu October 16, 2023 at 6:00 AM 41 10 min. read
Understanding DNS Tunneling Traffic in the Wild 12,672 people reacted Understanding DNS Tunneling Traffic in the Wild By Ruian Duan and Daiping Liu October 13, 2023 at 4:00 PM 27 11 min. read
Leveraging a Hooking Framework to Expand Malware Detection Coverage on the Android Platform 4,428 people reacted Leveraging a Hooking Framework to Expand Malware Detection Coverage on the Android Platform By Lee Wei Yeong, Xingjiali Zhang, Yang Ji and Wenjun Hu October 6, 2023 at 6:00 AM 15 13 min. read
Why LaZagne Makes D-Bus API Vigilance Crucial 3,506 people reacted Why LaZagne Makes D-Bus API Vigilance Crucial By Siddharth Sharma August 24, 2023 at 6:00 AM 7 6 min. read
NodeStealer 2.0 – The Python Version: Stealing Facebook Business Accounts 7,707 people reacted NodeStealer 2.0 – The Python Version: Stealing Facebook Business Accounts By Lior Rochberger August 1, 2023 at 6:00 AM 13 14 min. read
Diplomats Beware: Cloaked Ursa Phishing With a Twist 13,812 people reacted Diplomats Beware: Cloaked Ursa Phishing With a Twist By Unit 42 July 12, 2023 at 3:00 AM 19 15 min. read
Manic Menagerie 2.0: The Evolution of a Highly Motivated Threat Actor 17,586 people reacted Manic Menagerie 2.0: The Evolution of a Highly Motivated Threat Actor By Daniel Frank June 28, 2023 at 6:00 AM 11 14 min. read