Fighting Ursa Aka APT28: Illuminating a Covert Campaign 3,214 people reacted Fighting Ursa Aka APT28: Illuminating a Covert Campaign By Unit 42 December 7, 2023 at 6:00 AM 12 6 min. read
In-Depth Analysis of July 2023 Exploit Chain Featuring CVE-2023-36884 and CVE-2023-36584 8,087 people reacted In-Depth Analysis of July 2023 Exploit Chain Featuring CVE-2023-36884 and CVE-2023-36584 By Eli Birkan, Dan Yashnik, Oriel Cochavi, Bar Lahav and Mike Harbison November 13, 2023 at 3:00 AM 76 18 min. read
High Traffic + High Vulnerability = an Attractive Target for Criminals: The Dangers of Viewing Clickbait Sites 3,192 people reacted High Traffic + High Vulnerability = an Attractive Target for Criminals: The Dangers of Viewing Clickbait Sites By Shresta Bellary Seetharam, Tao Yan, Nabeel Mohamed, Tim Hofmockel, Alex Starov and Brad Duncan November 9, 2023 at 12:00 PM 48 8 min. read
Fake CVE-2023-40477 Proof of Concept Leads to VenomRAT 9,994 people reacted Fake CVE-2023-40477 Proof of Concept Leads to VenomRAT By Robert Falcone September 19, 2023 at 6:00 AM 12 10 min. read
CVE-2023-36884 - Microsoft Office and Windows HTML Remote Code Execution: Threat Brief (Updated) 22,945 people reacted CVE-2023-36884 - Microsoft Office and Windows HTML Remote Code Execution: Threat Brief (Updated) By Unit 42 July 12, 2023 at 11:45 AM 30 4 min. read
Inside Win32k Exploitation: Analysis of CVE-2022-21882 and CVE-2021-1732 21,432 people reacted Inside Win32k Exploitation: Analysis of CVE-2022-21882 and CVE-2021-1732 By Shawn Westfall June 20, 2023 at 6:00 AM 3 37 min. read
Inside Win32k Exploitation: Background on Implementations of Win32k and Exploitation Methodologies 25,623 people reacted Inside Win32k Exploitation: Background on Implementations of Win32k and Exploitation Methodologies By Shawn Westfall June 13, 2023 at 6:00 AM 5 18 min. read
Mirai Variant V3G4 Targets IoT Devices 68,577 people reacted Mirai Variant V3G4 Targets IoT Devices By Chao Lei, Zhibin Zhang, Cecilia Hu and Aveek Das February 15, 2023 at 6:00 AM 16 9 min. read
Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats 67,379 people reacted Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats By Yiheng An, Chao Lei, Adam Robbie, Aveek Das, Zhibin Zhang and Shehroze Farooqi January 24, 2023 at 6:00 AM 42 8 min. read
Network Security Trends: August-October 2022 54,742 people reacted Network Security Trends: August-October 2022 By Yiheng An January 12, 2023 at 6:00 AM 21 8 min. read
Security Issue in JWT Secret Poisoning (Updated) 130,312 people reacted Security Issue in JWT Secret Poisoning (Updated) By Artur Oleyarsh January 9, 2023 at 6:00 AM 56 8 min. read
Network Security Trends: May-July 2022 55,768 people reacted Network Security Trends: May-July 2022 By Yiheng An November 16, 2022 at 6:00 AM 14 7 min. read
Unit 42 Finds Three Vulnerabilities in OpenLiteSpeed Web Server 62,278 people reacted Unit 42 Finds Three Vulnerabilities in OpenLiteSpeed Web Server By Artur Avetisyan November 10, 2022 at 6:00 AM 9 5 min. read
Threat Brief: CVE-2022-3786 and CVE-2022-3602: OpenSSL X.509 Buffer Overflows 59,495 people reacted Threat Brief: CVE-2022-3786 and CVE-2022-3602: OpenSSL X.509 Buffer Overflows By Shawn Westfall November 2, 2022 at 6:00 PM 18 7 min. read
Threat Brief: CVE-2022-41040 and CVE-2022-41082: Microsoft Exchange Server (ProxyNotShell) 79,845 people reacted Threat Brief: CVE-2022-41040 and CVE-2022-41082: Microsoft Exchange Server (ProxyNotShell) By Shawn Westfall October 4, 2022 at 4:30 PM 110 8 min. read