Exposing a New BOLA Vulnerability in Grafana 0 people reacted Exposing a New BOLA Vulnerability in Grafana By Ravid Mazon and Jay Chen March 27, 2024 at 7:00 AM 5 8 min. read
ASEAN Entities in the Spotlight: Chinese APT Group Targeting 0 people reacted ASEAN Entities in the Spotlight: Chinese APT Group Targeting By Unit 42 March 26, 2024 at 1:00 PM 10 5 min. read
Large-Scale StrelaStealer Campaign in Early 2024 0 people reacted Large-Scale StrelaStealer Campaign in Early 2024 By Benjamin Chang, Goutam Tripathy, Pranay Kumar Chhaparwal, Anmol Maurya and Vishwa Thothathri March 22, 2024 at 3:00 AM 24 8 min. read
Curious Serpens’ FalseFont Backdoor: Technical Analysis, Detection and Prevention 0 people reacted Curious Serpens’ FalseFont Backdoor: Technical Analysis, Detection and Prevention By Tom Fakterman, Daniel Frank and Jerome Tujague March 21, 2024 at 3:00 AM 8 12 min. read
Unit 42 Collaborative Research With Ukraine’s Cyber Agency To Uncover the Smoke Loader Backdoor 0 people reacted Unit 42 Collaborative Research With Ukraine’s Cyber Agency To Uncover the Smoke Loader Backdoor By Unit 42 March 19, 2024 at 3:00 AM 17 4 min. read
Inside the Rabbit Hole: BunnyLoader 3.0 Unveiled 0 people reacted Inside the Rabbit Hole: BunnyLoader 3.0 Unveiled By Amanda Tanner, Anthony Galiette and Jerome Tujague March 15, 2024 at 3:00 AM 13 16 min. read
Threat Group Assessment: Muddled Libra (Updated) 0 people reacted Threat Group Assessment: Muddled Libra (Updated) By Kristopher Russo, Austin Dever and Amer Elsad March 8, 2024 at 2:58 PM 39 13 min. read
Wireshark Tutorial: Exporting Objects From a Pcap 0 people reacted Wireshark Tutorial: Exporting Objects From a Pcap By Brad Duncan March 1, 2024 at 6:00 AM 131 12 min. read
The Art of Domain Deception: Bifrost's New Tactic to Deceive Users 0 people reacted The Art of Domain Deception: Bifrost's New Tactic to Deceive Users By Anmol Maurya and Siddharth Sharma February 29, 2024 at 3:00 AM 113 6 min. read
Navigating the Cloud: Exploring Lateral Movement Techniques 0 people reacted Navigating the Cloud: Exploring Lateral Movement Techniques By Eden Elazar February 28, 2024 at 3:00 AM 24 12 min. read
Data From Chinese Security Services Company i-Soon Linked to Previous Chinese APT Campaigns 0 people reacted Data From Chinese Security Services Company i-Soon Linked to Previous Chinese APT Campaigns By Unit 42 February 23, 2024 at 5:00 PM 23 7 min. read
Intruders in the Library: Exploring DLL Hijacking 0 people reacted Intruders in the Library: Exploring DLL Hijacking By Tom Fakterman, Chen Erlich and Assaf Dahan February 22, 2024 at 4:00 PM 11 14 min. read
Threat Brief: ConnectWise ScreenConnect Vulnerabilities (CVE-2024-1708 and CVE-2024-1709) 0 people reacted Threat Brief: ConnectWise ScreenConnect Vulnerabilities (CVE-2024-1708 and CVE-2024-1709) By Unit 42 February 21, 2024 at 5:00 PM 6 5 min. read
2024 Unit 42 Incident Response Report: Navigating the Shift in Cybersecurity Threat Tactics 0 people reacted 2024 Unit 42 Incident Response Report: Navigating the Shift in Cybersecurity Threat Tactics By Unit 42 February 20, 2024 at 6:12 AM 16 5 min. read
Threat Brief: Attacks on Critical Infrastructure Attributed to Insidious Taurus (Volt Typhoon) 0 people reacted Threat Brief: Attacks on Critical Infrastructure Attributed to Insidious Taurus (Volt Typhoon) By Unit 42 February 14, 2024 at 2:30 PM 28 9 min. read