CloudKeys in the Air: Tracking Malicious Operations of Exposed IAM Keys 7,947 people reacted CloudKeys in the Air: Tracking Malicious Operations of Exposed IAM Keys By William Gamazo and Nathaniel Quist October 30, 2023 at 4:40 AM 23 15 min. read
P2PInfect: The Rusty Peer-to-Peer Self-Replicating Worm 11,097 people reacted P2PInfect: The Rusty Peer-to-Peer Self-Replicating Worm By William Gamazo and Nathaniel Quist July 19, 2023 at 10:00 AM 16 11 min. read
Vice Society: Profiling a Persistent Threat to the Education Sector 72,240 people reacted Vice Society: Profiling a Persistent Threat to the Education Sector By JR Gumarin December 6, 2022 at 3:00 AM 58 13 min. read
Threat Assessment: Luna Moth Callback Phishing Campaign 75,105 people reacted Threat Assessment: Luna Moth Callback Phishing Campaign By Kristopher Russo November 21, 2022 at 3:00 AM 21 8 min. read
An AI Based Solution to Detecting the DoubleZero .NET Wiper 56,737 people reacted An AI Based Solution to Detecting the DoubleZero .NET Wiper By Akshata Rao, Zong-Yu Wu and Wenjun Hu November 18, 2022 at 6:00 PM 8 7 min. read
Typhon Reborn With New Capabilities 58,500 people reacted Typhon Reborn With New Capabilities By Riley Porter and Uday Pratap Singh November 14, 2022 at 6:00 AM 7 7 min. read
Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild 74,571 people reacted Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild By Durgesh Sangvikar, Chris Navarrete, Matthew Tennis, Yanhui Jia, Yu Fu and Siddhart Shibiraj November 3, 2022 at 6:00 AM 27 9 min. read
Threat Brief: CVE-2022-3786 and CVE-2022-3602: OpenSSL X.509 Buffer Overflows 60,171 people reacted Threat Brief: CVE-2022-3786 and CVE-2022-3602: OpenSSL X.509 Buffer Overflows By Shawn Westfall November 2, 2022 at 6:00 PM 18 7 min. read
Banking Trojan Techniques: How Financially Motivated Malware Became Infrastructure 67,677 people reacted Banking Trojan Techniques: How Financially Motivated Malware Became Infrastructure By Or Chechik October 31, 2022 at 6:00 AM 17 10 min. read
Defeating Guloader Anti-Analysis Technique 57,113 people reacted Defeating Guloader Anti-Analysis Technique By Mark Lim October 28, 2022 at 6:00 AM 8 5 min. read
Ransom Cartel Ransomware: A Possible Connection With REvil 73,377 people reacted Ransom Cartel Ransomware: A Possible Connection With REvil By Amer Elsad and Daniel Bunce October 14, 2022 at 6:00 AM 22 17 min. read
Threat Brief: CVE-2022-41040 and CVE-2022-41082: Microsoft Exchange Server (ProxyNotShell) 80,847 people reacted Threat Brief: CVE-2022-41040 and CVE-2022-41082: Microsoft Exchange Server (ProxyNotShell) By Shawn Westfall October 4, 2022 at 4:30 PM 110 8 min. read
More Than Meets the Eye: Exposing a Polyglot File That Delivers IcedID 64,658 people reacted More Than Meets the Eye: Exposing a Polyglot File That Delivers IcedID By Mark Lim September 27, 2022 at 6:00 AM 71 4 min. read
Hunting for Unsigned DLLs to Find APTs 77,719 people reacted Hunting for Unsigned DLLs to Find APTs By Daniela Shalev and Itay Gamliel September 26, 2022 at 6:00 AM 140 7 min. read
Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime 69,549 people reacted Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime By Janos Szurdi, Rebekah Houser and Daiping Liu September 21, 2022 at 6:00 AM 81 7 min. read