Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats 18,726 people reacted Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats By Yiheng An, Chao Lei, Adam Robbie, Aveek Das, Zhibin Zhang and Shehroze Farooqi January 24, 2023 at 6:00 AM 28 8 min. read
Answers to Unit 42 Wireshark Quiz, January 2023 9,835 people reacted Answers to Unit 42 Wireshark Quiz, January 2023 By Brad Duncan January 23, 2023 at 6:00 AM 4 6 min. read
Unit 42 Wireshark Quiz, January 2023 15,345 people reacted Unit 42 Wireshark Quiz, January 2023 By Brad Duncan January 20, 2023 at 6:00 AM 9 4 min. read
Network Security Trends: August-October 2022 17,856 people reacted Network Security Trends: August-October 2022 By Yiheng An January 12, 2023 at 6:00 AM 13 11 min. read
Threat Brief: OWASSRF Vulnerability Exploitation 41,396 people reacted Threat Brief: OWASSRF Vulnerability Exploitation By Robert Falcone and Lior Rochberger December 22, 2022 at 5:30 PM 11 9 min. read
Blowing Cobalt Strike Out of the Water With Memory Analysis 53,650 people reacted Blowing Cobalt Strike Out of the Water With Memory Analysis By Dominik Reichel, Esmid Idrizovic and Bob Jung December 2, 2022 at 6:00 AM 18 15 min. read
Typhon Reborn With New Capabilities 54,252 people reacted Typhon Reborn With New Capabilities By Riley Porter and Uday Pratap Singh November 14, 2022 at 6:00 AM 7 7 min. read
Threat Brief: CVE-2022-3786 and CVE-2022-3602: OpenSSL X.509 Buffer Overflows 56,493 people reacted Threat Brief: CVE-2022-3786 and CVE-2022-3602: OpenSSL X.509 Buffer Overflows By Shawn Westfall November 2, 2022 at 6:00 PM 18 7 min. read
Defeating Guloader Anti-Analysis Technique 52,615 people reacted Defeating Guloader Anti-Analysis Technique By Mark Lim October 28, 2022 at 6:00 AM 8 5 min. read
Trends in Web Threats in CY Q2 2022: Malicious JavaScript Downloaders Are Evolving 49,250 people reacted Trends in Web Threats in CY Q2 2022: Malicious JavaScript Downloaders Are Evolving By Cecilia Hu, Tao Yan, Jin Chen and Taojie Wang October 26, 2022 at 6:00 AM 8 8 min. read
CNAME Cloaking: Disguising Third Parties Through the DNS 49,357 people reacted CNAME Cloaking: Disguising Third Parties Through the DNS By Rebekah Houser and Daiping Liu October 24, 2022 at 6:00 AM 5 10 min. read
Detecting Emerging Network Threats From Newly Observed Domains 49,556 people reacted Detecting Emerging Network Threats From Newly Observed Domains By Zhanhao Chen, Daiping Liu, Wanjin Li and Fan Fei October 17, 2022 at 6:00 AM 7 8 min. read
Ransom Cartel Ransomware: A Possible Connection With REvil 66,571 people reacted Ransom Cartel Ransomware: A Possible Connection With REvil By Amer Elsad and Daniel Bunce October 14, 2022 at 6:00 AM 21 17 min. read
Threat Brief: CVE-2022-41040 and CVE-2022-41082: Microsoft Exchange Server (ProxyNotShell) 73,716 people reacted Threat Brief: CVE-2022-41040 and CVE-2022-41082: Microsoft Exchange Server (ProxyNotShell) By Shawn Westfall October 4, 2022 at 4:30 PM 108 8 min. read
Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime 63,182 people reacted Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime By Janos Szurdi, Rebekah Houser and Daiping Liu September 21, 2022 at 6:00 AM 80 7 min. read