Diving Into Glupteba's UEFI Bootkit 7,287 people reacted Diving Into Glupteba's UEFI Bootkit By Lior Rochberger and Dan Yashnik February 12, 2024 at 6:00 AM 12 12 min. read
Ransomware Retrospective 2024: Unit 42 Leak Site Analysis 10,947 people reacted Ransomware Retrospective 2024: Unit 42 Leak Site Analysis By Doel Santos February 5, 2024 at 3:00 AM 19 17 min. read
Exploring the Latest Mispadu Stealer Variant 6,584 people reacted Exploring the Latest Mispadu Stealer Variant By Daniela Shalev and Josh Grunzweig February 2, 2024 at 3:00 AM 22 12 min. read
ApateWeb: An Evasive Large-Scale Scareware and PUP Delivery Campaign 8,333 people reacted ApateWeb: An Evasive Large-Scale Scareware and PUP Delivery Campaign By Shehroze Farooqi, Howard Tong, Alex Starov, Nabeel Mohamed, Royce Lu and Zhanhao Chen January 31, 2024 at 3:00 AM 31 12 min. read
Threat Assessment: BianLian 9,210 people reacted Threat Assessment: BianLian By Daniel Frank January 23, 2024 at 3:00 AM 29 10 min. read
Parrot TDS: A Persistent and Evolving Malware Campaign 7,480 people reacted Parrot TDS: A Persistent and Evolving Malware Campaign By Zhanglin He, Ben Zhang, Billy Melicher, Qi Deng, Bo Qu and Brad Duncan January 19, 2024 at 12:00 PM 36 12 min. read
Medusa Ransomware Turning Your Files into Stone 13,364 people reacted Medusa Ransomware Turning Your Files into Stone By Anthony Galiette and Doel Santos January 11, 2024 at 6:00 AM 17 16 min. read
Dual Privilege Escalation Chain: Exploiting Monitoring and Service Mesh Configurations and Privileges in GKE to Gain Unauthorized Access in Kubernetes 7,177 people reacted Dual Privilege Escalation Chain: Exploiting Monitoring and Service Mesh Configurations and Privileges in GKE to Gain Unauthorized Access in Kubernetes By Shaul Ben Hai December 27, 2023 at 6:00 AM 33 11 min. read
Why Is an Australian Footballer Collecting My Passwords? The Various Ways Malicious JavaScript Can Steal Your Secrets 5,525 people reacted Why Is an Australian Footballer Collecting My Passwords? The Various Ways Malicious JavaScript Can Steal Your Secrets By Billy Melicher, Nabeel Mohamed and Alex Starov December 20, 2023 at 3:00 AM 37 9 min. read
Fighting Ursa Aka APT28: Illuminating a Covert Campaign 13,197 people reacted Fighting Ursa Aka APT28: Illuminating a Covert Campaign By Unit 42 December 7, 2023 at 6:00 AM 49 6 min. read
New Tool Set Found Used Against Organizations in the Middle East, Africa and the US 12,941 people reacted New Tool Set Found Used Against Organizations in the Middle East, Africa and the US By Chema Garcia December 1, 2023 at 3:00 AM 49 14 min. read
Exploring a Critical Risk in Google Workspace's Domain-Wide Delegation Feature 5,684 people reacted Exploring a Critical Risk in Google Workspace's Domain-Wide Delegation Feature By Zohar Zigdon November 30, 2023 at 3:00 PM 19 10 min. read
Hacking Employers and Seeking Employment: Two Job-Related Campaigns Bear Hallmarks of North Korean Threat Actors 19,895 people reacted Hacking Employers and Seeking Employment: Two Job-Related Campaigns Bear Hallmarks of North Korean Threat Actors By Unit 42 November 21, 2023 at 6:00 AM 123 17 min. read
Stately Taurus Targets the Philippines As Tensions Flare in the South Pacific 9,282 people reacted Stately Taurus Targets the Philippines As Tensions Flare in the South Pacific By Unit 42 November 17, 2023 at 3:00 AM 93 6 min. read
In-Depth Analysis of July 2023 Exploit Chain Featuring CVE-2023-36884 and CVE-2023-36584 11,545 people reacted In-Depth Analysis of July 2023 Exploit Chain Featuring CVE-2023-36884 and CVE-2023-36584 By Eli Birkan, Dan Yashnik, Oriel Cochavi, Bar Lahav and Mike Harbison November 13, 2023 at 3:00 AM 79 18 min. read