P2PInfect: The Rusty Peer-to-Peer Self-Replicating Worm 8,194 people reacted P2PInfect: The Rusty Peer-to-Peer Self-Replicating Worm By William Gamazo and Nathaniel Quist July 19, 2023 at 10:00 AM 13 11 min. read
Vice Society: Profiling a Persistent Threat to the Education Sector 70,783 people reacted Vice Society: Profiling a Persistent Threat to the Education Sector By JR Gumarin December 6, 2022 at 3:00 AM 31 13 min. read
Threat Assessment: Luna Moth Callback Phishing Campaign 73,087 people reacted Threat Assessment: Luna Moth Callback Phishing Campaign By Kristopher Russo November 21, 2022 at 3:00 AM 20 8 min. read
An AI Based Solution to Detecting the DoubleZero .NET Wiper 56,176 people reacted An AI Based Solution to Detecting the DoubleZero .NET Wiper By Akshata Rao, Zong-Yu Wu and Wenjun Hu November 18, 2022 at 6:00 PM 8 7 min. read
Typhon Reborn With New Capabilities 57,908 people reacted Typhon Reborn With New Capabilities By Riley Porter and Uday Pratap Singh November 14, 2022 at 6:00 AM 7 7 min. read
Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild 72,030 people reacted Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild By Durgesh Sangvikar, Chris Navarrete, Matthew Tennis, Yanhui Jia, Yu Fu and Siddhart Shibiraj November 3, 2022 at 6:00 AM 26 9 min. read
Threat Brief: CVE-2022-3786 and CVE-2022-3602: OpenSSL X.509 Buffer Overflows 59,376 people reacted Threat Brief: CVE-2022-3786 and CVE-2022-3602: OpenSSL X.509 Buffer Overflows By Shawn Westfall November 2, 2022 at 6:00 PM 18 7 min. read
Banking Trojan Techniques: How Financially Motivated Malware Became Infrastructure 66,438 people reacted Banking Trojan Techniques: How Financially Motivated Malware Became Infrastructure By Or Chechik October 31, 2022 at 6:00 AM 15 10 min. read
Defeating Guloader Anti-Analysis Technique 56,286 people reacted Defeating Guloader Anti-Analysis Technique By Mark Lim October 28, 2022 at 6:00 AM 8 5 min. read
Ransom Cartel Ransomware: A Possible Connection With REvil 72,447 people reacted Ransom Cartel Ransomware: A Possible Connection With REvil By Amer Elsad and Daniel Bunce October 14, 2022 at 6:00 AM 21 17 min. read
Threat Brief: CVE-2022-41040 and CVE-2022-41082: Microsoft Exchange Server (ProxyNotShell) 79,452 people reacted Threat Brief: CVE-2022-41040 and CVE-2022-41082: Microsoft Exchange Server (ProxyNotShell) By Shawn Westfall October 4, 2022 at 4:30 PM 110 8 min. read
More Than Meets the Eye: Exposing a Polyglot File That Delivers IcedID 63,872 people reacted More Than Meets the Eye: Exposing a Polyglot File That Delivers IcedID By Mark Lim September 27, 2022 at 6:00 AM 71 4 min. read
Hunting for Unsigned DLLs to Find APTs 75,918 people reacted Hunting for Unsigned DLLs to Find APTs By Daniela Shalev and Itay Gamliel September 26, 2022 at 6:00 AM 137 7 min. read
Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime 68,244 people reacted Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime By Janos Szurdi, Rebekah Houser and Daiping Liu September 21, 2022 at 6:00 AM 81 7 min. read
OriginLogger: A Look at Agent Tesla’s Successor 71,193 people reacted OriginLogger: A Look at Agent Tesla’s Successor By Jeff White September 13, 2022 at 6:00 AM 48 14 min. read