CloudKeys in the Air: Tracking Malicious Operations of Exposed IAM Keys 6,349 people reacted CloudKeys in the Air: Tracking Malicious Operations of Exposed IAM Keys By William Gamazo and Nathaniel Quist October 30, 2023 at 4:40 AM 22 15 min. read
BlackCat Climbs the Summit With a New Tactic 11,220 people reacted BlackCat Climbs the Summit With a New Tactic By Unit 42 October 18, 2023 at 6:00 AM 122 9 min. read
Detecting Emerging Network Threats From Newly Observed Domains 52,786 people reacted Detecting Emerging Network Threats From Newly Observed Domains By Zhanhao Chen, Daiping Liu, Wanjin Li and Fan Fei October 17, 2022 at 6:00 AM 8 8 min. read
Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime 68,576 people reacted Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime By Janos Szurdi, Rebekah Houser and Daiping Liu September 21, 2022 at 6:00 AM 81 7 min. read
Threat Assessment: BlackByte Ransomware 47,699 people reacted Threat Assessment: BlackByte Ransomware By Amer Elsad April 21, 2022 at 12:00 PM 27 10 min. read
Threat Assessment: BlackCat Ransomware 97,782 people reacted Threat Assessment: BlackCat Ransomware By Amanda Tanner, Alex Hinchliffe and Doel Santos January 27, 2022 at 6:00 AM 63 10 min. read
A Peek into Top-Level Domains and Cybercrime 68,567 people reacted A Peek into Top-Level Domains and Cybercrime By Janos Szurdi November 11, 2021 at 6:00 AM 38 11 min. read
Attackers Are Taking Advantage of the Open-Source Service Interactsh for Malicious Purposes 76,846 people reacted Attackers Are Taking Advantage of the Open-Source Service Interactsh for Malicious Purposes By Yue Guan, Jin Chen, Leo Olson, Wayne Xin and Daiping Liu October 14, 2021 at 6:00 AM 50 7 min. read
SilverTerrier – Nigerian Business Email Compromise 53,429 people reacted SilverTerrier – Nigerian Business Email Compromise By Peter Renals October 7, 2021 at 6:00 AM 18 19 min. read
Credential Harvesting at Scale Without Malware 49,719 people reacted Credential Harvesting at Scale Without Malware By Brady Stout September 30, 2021 at 3:00 PM 67 8 min. read
Network Security Trends: May-July 2021 48,414 people reacted Network Security Trends: May-July 2021 By Yue Guan and Lei Xu September 17, 2021 at 3:00 PM 15 9 min. read
Phishing Eager Travelers 52,759 people reacted Phishing Eager Travelers By Anna Chung and Swetha Balla September 15, 2021 at 6:00 AM 31 9 min. read
PhishingJS: A Deep Learning Model for JavaScript-Based Phishing Detection 41,913 people reacted PhishingJS: A Deep Learning Model for JavaScript-Based Phishing Detection By Lucas Hu September 10, 2021 at 6:00 AM 28 7 min. read
Ransomware Groups to Watch: Emerging Threats 71,751 people reacted Ransomware Groups to Watch: Emerging Threats By Doel Santos and Ruchna Nigam August 24, 2021 at 3:00 AM 65 11 min. read
Personal VPN and Its Evasions: Risk Factors and How to Maintain Network Visibility 33,912 people reacted Personal VPN and Its Evasions: Risk Factors and How to Maintain Network Visibility By Saeed Abbasi and Kirti Parekh August 16, 2021 at 6:00 PM 45 7 min. read