Chinese PlugX Malware Hidden in Your USB Devices? 2,321 people reacted Chinese PlugX Malware Hidden in Your USB Devices? By Mike Harbison and Jen Miller-Osborn January 26, 2023 at 6:00 AM 5 12 min. read
Answers to Unit 42 Wireshark Quiz, January 2023 3,826 people reacted Answers to Unit 42 Wireshark Quiz, January 2023 By Brad Duncan January 23, 2023 at 6:00 AM 2 6 min. read
Unit 42 Wireshark Quiz, January 2023 9,031 people reacted Unit 42 Wireshark Quiz, January 2023 By Brad Duncan January 20, 2023 at 6:00 AM 7 4 min. read
Chinese Playful Taurus Activity in Iran 16,577 people reacted Chinese Playful Taurus Activity in Iran By Unit 42 January 18, 2023 at 3:00 AM 22 9 min. read
Network Security Trends: August-October 2022 12,449 people reacted Network Security Trends: August-October 2022 By Yiheng An January 12, 2023 at 6:00 AM 12 11 min. read
Threat Brief: OWASSRF Vulnerability Exploitation 35,916 people reacted Threat Brief: OWASSRF Vulnerability Exploitation By Robert Falcone and Lior Rochberger December 22, 2022 at 5:30 PM 11 9 min. read
Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine 49,429 people reacted Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine By Unit 42 December 20, 2022 at 3:00 AM 31 15 min. read
Precious Gemstones: The New Generation of Kerberos Attacks 44,709 people reacted Precious Gemstones: The New Generation of Kerberos Attacks By Oz Soprin and Shachar Roitman December 12, 2022 at 6:00 AM 21 14 min. read
Compromised Cloud Compute Credentials: Case Studies From the Wild 44,647 people reacted Compromised Cloud Compute Credentials: Case Studies From the Wild By Dror Alon December 8, 2022 at 3:00 PM 36 9 min. read
Vice Society: Profiling a Persistent Threat to the Education Sector 53,253 people reacted Vice Society: Profiling a Persistent Threat to the Education Sector By JR Gumarin December 6, 2022 at 3:00 AM 9 13 min. read
Blowing Cobalt Strike Out of the Water With Memory Analysis 52,550 people reacted Blowing Cobalt Strike Out of the Water With Memory Analysis By Dominik Reichel, Esmid Idrizovic and Bob Jung December 2, 2022 at 6:00 AM 18 15 min. read
Threat Assessment: Luna Moth Callback Phishing Campaign 64,731 people reacted Threat Assessment: Luna Moth Callback Phishing Campaign By Kristopher Russo November 21, 2022 at 3:00 AM 16 8 min. read
An AI Based Solution to Detecting the DoubleZero .NET Wiper 52,017 people reacted An AI Based Solution to Detecting the DoubleZero .NET Wiper By Akshata Rao, Zong-Yu Wu and Wenjun Hu November 18, 2022 at 6:00 PM 8 7 min. read
Typhon Reborn With New Capabilities 53,852 people reacted Typhon Reborn With New Capabilities By Riley Porter and Uday Pratap Singh November 14, 2022 at 6:00 AM 7 7 min. read
Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild 64,982 people reacted Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild By Durgesh Sangvikar, Chris Navarrete, Matthew Tennis, Yanhui Jia, Yu Fu and Siddhart Shibiraj November 3, 2022 at 6:00 AM 22 9 min. read