2,069 people reacted There Is More Than One Way to Sleep: Dive Deep Into the Implementations of API Hammering by Various Malware Families By Mark Lim and Riley Porter June 24, 2022 at 6:00 AM 1 5 min. read
27,168 people reacted Network Attack Trends: Attackers Leveraging High Severity and Critical Exploits (May-July 2020) By Brock Mammen, Yue Guan and Yu Fu September 15, 2020 at 6:00 AM 20 8 min. read
22,368 people reacted Palo Alto Networks Researcher Discovers Four Critical Vulnerabilities in Adobe Flash Player By Ryan Olson October 20, 2016 at 1:00 PM 42 < 1 min. read
31,044 people reacted Palo Alto Networks Discovers Two Adobe Reader Privileged JavaScript Zero-Days By Gal De Leon October 17, 2016 at 5:00 AM 1 8 min. read
Palo Alto Networks Researcher Discovers Eight Critical Vulnerabilities in Adobe Flash Player By Ryan Olson September 19, 2016 at 5:00 AM 1 < 1 min. read
Aveo Malware Family Targets Japanese Speaking Users By Josh Grunzweig and Robert Falcone August 16, 2016 at 11:00 PM 0 5 min. read
Fresh Baked HOMEKit-made Cookles – With a DarkHotel Overlap By Bryan Lee and Robert Falcone August 12, 2016 at 5:00 AM 0 10 min. read
Afraidgate: Major Exploit Kit Campaign Switches from CryptXXX Ransomware Back to Locky By Brad Duncan July 29, 2016 at 10:30 AM 0 4 min. read
Palo Alto Networks Researchers Discover Critical Safari 9.1 Vulnerability By Ryan Olson July 27, 2016 at 5:00 AM 1 < 1 min. read
PowerWare Ransomware Spoofing Locky Malware Family By Tyler Halfpop and Jacob Soo July 21, 2016 at 10:40 AM 0 4 min. read
29,236 people reacted Technical Walkthrough: Office Test Persistence Method Used In Recent Sofacy Attacks By Robert Falcone July 20, 2016 at 5:00 AM 1 9 min. read
Andromeda Botnet Targets Italy in Recent Spam Campaigns By Josh Grunzweig and Brandon Levene July 18, 2016 at 12:30 PM 0 3 min. read
Palo Alto Networks Researchers Discover Two Critical Internet Explorer Vulnerabilities By Ryan Olson July 13, 2016 at 1:15 PM 0 < 1 min. read