41,068 people reacted Technical Walkthrough: Office Test Persistence Method Used In Recent Sofacy Attacks By Robert Falcone July 20, 2016 at 5:00 AM 9 9 min. read
Andromeda Botnet Targets Italy in Recent Spam Campaigns By Josh Grunzweig and Brandon Levene July 18, 2016 at 12:30 PM 8 3 min. read
How to Track Actors Behind Keyloggers Using Embedded Credentials By Jeff White July 12, 2016 at 3:00 PM 22 8 min. read
Extending AutoFocus Threat Intelligence With New Tag Types By Mike Scott June 17, 2016 at 4:05 PM 6 6 min. read
The OilRig Campaign: Attacks on Saudi Arabian Organizations Deliver Helminth Backdoor By Robert Falcone and Bryan Lee May 26, 2016 at 2:05 PM 18 15 min. read
Operation Ke3chang Resurfaces With New TidePool Malware By Micah Yates, Mike Scott, Brandon Levene, Jen Miller-Osborn and Tom Keigher May 22, 2016 at 6:00 PM 29 6 min. read
Prince of Persia: Infy Malware Active In Decade of Targeted Attacks By Tomer Bar and Simon Conant May 2, 2016 at 5:00 AM 4 10 min. read
2016 Verizon Data Breach Investigations Report (DBIR): Insights from Unit 42 By Ryan Olson April 27, 2016 at 3:00 PM 6 2 min. read
Ransomware: Locky, TeslaCrypt, Other Malware Families Use New Tool To Evade Detection By Jeff White, Chris Astacio and Micah Yates April 8, 2016 at 9:50 AM 11 5 min. read
PowerSniff Malware Used in Macro-based Attacks By Josh Grunzweig and Brandon Levene March 11, 2016 at 1:00 PM 9 6 min. read
Banload Malware Affecting Brazil Exhibits Unusually Complex Infection Process By Anthony Kasza March 8, 2016 at 9:45 AM 4 7 min. read
KeyBase Threat Grows Despite Public Takedown: A Picture is Worth a Thousand Words By Jeff White February 25, 2016 at 5:00 AM 15 24 min. read
New Android Trojan “Xbot” Phishes Credit Cards and Bank Accounts, Encrypts Devices for Ransom By Cong Zheng, Claud Xiao and Zhi Xu February 18, 2016 at 4:00 PM 5 7 min. read