Threat Brief: Operation MidnightEclipse, Post-Exploitation Activity Related to CVE-2024-3400 (Updated) 73,564 people reacted Threat Brief: Operation MidnightEclipse, Post-Exploitation Activity Related to CVE-2024-3400 (Updated) By Unit 42 April 12, 2024 at 10:00 AM 107 9 min. read
Threat Brief: Vulnerability in XZ Utils Data Compression Library Impacting Multiple Linux Distributions (CVE-2024-3094) 37,006 people reacted Threat Brief: Vulnerability in XZ Utils Data Compression Library Impacting Multiple Linux Distributions (CVE-2024-3094) By Unit 42 March 30, 2024 at 7:15 PM 46 6 min. read
Large-Scale StrelaStealer Campaign in Early 2024 8,589 people reacted Large-Scale StrelaStealer Campaign in Early 2024 By Benjamin Chang, Goutam Tripathy, Pranay Kumar Chhaparwal, Anmol Maurya and Vishwa Thothathri March 22, 2024 at 3:00 AM 30 8 min. read
Curious Serpens’ FalseFont Backdoor: Technical Analysis, Detection and Prevention 4,544 people reacted Curious Serpens’ FalseFont Backdoor: Technical Analysis, Detection and Prevention By Tom Fakterman, Daniel Frank and Jerome Tujague March 21, 2024 at 3:00 AM 8 12 min. read
Unit 42 Collaborative Research With Ukraine’s Cyber Agency To Uncover the Smoke Loader Backdoor 3,750 people reacted Unit 42 Collaborative Research With Ukraine’s Cyber Agency To Uncover the Smoke Loader Backdoor By Unit 42 March 19, 2024 at 3:00 AM 19 4 min. read
Inside the Rabbit Hole: BunnyLoader 3.0 Unveiled 6,631 people reacted Inside the Rabbit Hole: BunnyLoader 3.0 Unveiled By Amanda Tanner, Anthony Galiette and Jerome Tujague March 15, 2024 at 3:00 AM 13 16 min. read
Threat Group Assessment: Muddled Libra (Updated) 36,427 people reacted Threat Group Assessment: Muddled Libra (Updated) By Kristopher Russo, Austin Dever and Amer Elsad March 8, 2024 at 2:58 PM 40 13 min. read
Wireshark Tutorial: Exporting Objects From a Pcap 221,811 people reacted Wireshark Tutorial: Exporting Objects From a Pcap By Brad Duncan March 1, 2024 at 6:00 AM 133 12 min. read
The Art of Domain Deception: Bifrost's New Tactic to Deceive Users 6,864 people reacted The Art of Domain Deception: Bifrost's New Tactic to Deceive Users By Anmol Maurya and Siddharth Sharma February 29, 2024 at 3:00 AM 114 6 min. read
Navigating the Cloud: Exploring Lateral Movement Techniques 7,608 people reacted Navigating the Cloud: Exploring Lateral Movement Techniques By Eden Elazar February 28, 2024 at 3:00 AM 26 12 min. read
Threat Brief: ConnectWise ScreenConnect Vulnerabilities (CVE-2024-1708 and CVE-2024-1709) 6,702 people reacted Threat Brief: ConnectWise ScreenConnect Vulnerabilities (CVE-2024-1708 and CVE-2024-1709) By Unit 42 February 21, 2024 at 5:00 PM 7 5 min. read
2024 Unit 42 Incident Response Report: Navigating the Shift in Cybersecurity Threat Tactics 6,310 people reacted 2024 Unit 42 Incident Response Report: Navigating the Shift in Cybersecurity Threat Tactics By Unit 42 February 20, 2024 at 6:12 AM 17 5 min. read
Threat Brief: Attacks on Critical Infrastructure Attributed to Insidious Taurus (Volt Typhoon) 57,954 people reacted Threat Brief: Attacks on Critical Infrastructure Attributed to Insidious Taurus (Volt Typhoon) By Unit 42 February 14, 2024 at 2:30 PM 28 9 min. read
Diving Into Glupteba's UEFI Bootkit 6,688 people reacted Diving Into Glupteba's UEFI Bootkit By Lior Rochberger and Dan Yashnik February 12, 2024 at 6:00 AM 12 12 min. read
Ransomware Retrospective 2024: Unit 42 Leak Site Analysis 9,867 people reacted Ransomware Retrospective 2024: Unit 42 Leak Site Analysis By Doel Santos February 5, 2024 at 3:00 AM 17 17 min. read