Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime 69,551 people reacted Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime By Janos Szurdi, Rebekah Houser and Daiping Liu September 21, 2022 at 6:00 AM 81 7 min. read
Credential Gathering From Third-Party Software 58,770 people reacted Credential Gathering From Third-Party Software By Dor Attar September 8, 2022 at 12:00 PM 58 14 min. read
Targeted Attack Campaign Against ManageEngine ADSelfService Plus Delivers Godzilla Webshells, NGLite Trojan and KdcSponge Stealer 115,725 people reacted Targeted Attack Campaign Against ManageEngine ADSelfService Plus Delivers Godzilla Webshells, NGLite Trojan and KdcSponge Stealer By Robert Falcone, Jeff White and Peter Renals November 7, 2021 at 6:00 PM 70 18 min. read
TeamTNT Actively Enumerating Cloud Environments to Infiltrate Organizations 56,509 people reacted TeamTNT Actively Enumerating Cloud Environments to Infiltrate Organizations By Nathaniel Quist June 4, 2021 at 6:00 AM 18 13 min. read
Threat Brief: Codecov Bash Uploader 32,051 people reacted Threat Brief: Codecov Bash Uploader By Unit 42 April 23, 2021 at 2:00 PM 14 < 1 min. read
Actor Exploits Microsoft Exchange Server Vulnerabilities, Cortex XDR Blocks Harvesting of Credentials 45,690 people reacted Actor Exploits Microsoft Exchange Server Vulnerabilities, Cortex XDR Blocks Harvesting of Credentials By Robert Falcone April 15, 2021 at 6:00 AM 26 8 min. read
xHunt Campaign: New Watering Hole Identified for Credential Harvesting 32,439 people reacted xHunt Campaign: New Watering Hole Identified for Credential Harvesting By Brittany Barbehenn and Robert Falcone January 27, 2020 at 6:00 PM 21 7 min. read
xHunt Campaign: xHunt Actor’s Cheat Sheet 36,629 people reacted xHunt Campaign: xHunt Actor’s Cheat Sheet By Robert Falcone December 4, 2019 at 8:00 PM 17 19 min. read