It Was Not Me! Malware-Initiated Vulnerability Scanning Is on the Rise 3,887 people reacted It Was Not Me! Malware-Initiated Vulnerability Scanning Is on the Rise By Beliz Kaleli, Fang Liu, Peng Peng, Alex Starov, Joey Allen and Stefan Springer April 8, 2024 at 3:00 PM 14 8 min. read
Threat Brief: Vulnerability in XZ Utils Data Compression Library Impacting Multiple Linux Distributions (CVE-2024-3094) 36,865 people reacted Threat Brief: Vulnerability in XZ Utils Data Compression Library Impacting Multiple Linux Distributions (CVE-2024-3094) By Unit 42 March 30, 2024 at 7:15 PM 46 6 min. read
Large-Scale StrelaStealer Campaign in Early 2024 8,514 people reacted Large-Scale StrelaStealer Campaign in Early 2024 By Benjamin Chang, Goutam Tripathy, Pranay Kumar Chhaparwal, Anmol Maurya and Vishwa Thothathri March 22, 2024 at 3:00 AM 30 8 min. read
Curious Serpens’ FalseFont Backdoor: Technical Analysis, Detection and Prevention 4,513 people reacted Curious Serpens’ FalseFont Backdoor: Technical Analysis, Detection and Prevention By Tom Fakterman, Daniel Frank and Jerome Tujague March 21, 2024 at 3:00 AM 8 12 min. read
Unit 42 Collaborative Research With Ukraine’s Cyber Agency To Uncover the Smoke Loader Backdoor 3,735 people reacted Unit 42 Collaborative Research With Ukraine’s Cyber Agency To Uncover the Smoke Loader Backdoor By Unit 42 March 19, 2024 at 3:00 AM 19 4 min. read
Inside the Rabbit Hole: BunnyLoader 3.0 Unveiled 6,607 people reacted Inside the Rabbit Hole: BunnyLoader 3.0 Unveiled By Amanda Tanner, Anthony Galiette and Jerome Tujague March 15, 2024 at 3:00 AM 13 16 min. read
Wireshark Tutorial: Exporting Objects From a Pcap 221,710 people reacted Wireshark Tutorial: Exporting Objects From a Pcap By Brad Duncan March 1, 2024 at 6:00 AM 133 12 min. read
The Art of Domain Deception: Bifrost's New Tactic to Deceive Users 6,839 people reacted The Art of Domain Deception: Bifrost's New Tactic to Deceive Users By Anmol Maurya and Siddharth Sharma February 29, 2024 at 3:00 AM 114 6 min. read
Intruders in the Library: Exploring DLL Hijacking 4,523 people reacted Intruders in the Library: Exploring DLL Hijacking By Tom Fakterman, Chen Erlich and Assaf Dahan February 22, 2024 at 4:00 PM 12 14 min. read
Diving Into Glupteba's UEFI Bootkit 6,675 people reacted Diving Into Glupteba's UEFI Bootkit By Lior Rochberger and Dan Yashnik February 12, 2024 at 6:00 AM 12 12 min. read
Ransomware Retrospective 2024: Unit 42 Leak Site Analysis 9,824 people reacted Ransomware Retrospective 2024: Unit 42 Leak Site Analysis By Doel Santos February 5, 2024 at 3:00 AM 17 17 min. read
Parrot TDS: A Persistent and Evolving Malware Campaign 6,944 people reacted Parrot TDS: A Persistent and Evolving Malware Campaign By Zhanglin He, Ben Zhang, Billy Melicher, Qi Deng, Bo Qu and Brad Duncan January 19, 2024 at 12:00 PM 36 12 min. read
Financial Fraud APK Campaign 4,770 people reacted Financial Fraud APK Campaign By Chao Lei, Lee Wei Yeong, Zhanhao Chen, Yang Ji, Qi Deng, Royce Lu and Daiping Liu January 12, 2024 at 3:00 AM 37 5 min. read
Why Is an Australian Footballer Collecting My Passwords? The Various Ways Malicious JavaScript Can Steal Your Secrets 5,163 people reacted Why Is an Australian Footballer Collecting My Passwords? The Various Ways Malicious JavaScript Can Steal Your Secrets By Billy Melicher, Nabeel Mohamed and Alex Starov December 20, 2023 at 3:00 AM 36 9 min. read
New Tool Set Found Used Against Organizations in the Middle East, Africa and the US 12,608 people reacted New Tool Set Found Used Against Organizations in the Middle East, Africa and the US By Chema Garcia December 1, 2023 at 3:00 AM 49 14 min. read