PhishingJS: A Deep Learning Model for JavaScript-Based Phishing Detection 42,709 people reacted PhishingJS: A Deep Learning Model for JavaScript-Based Phishing Detection By Lucas Hu September 10, 2021 at 6:00 AM 28 7 min. read
Ransomware Groups to Watch: Emerging Threats 72,741 people reacted Ransomware Groups to Watch: Emerging Threats By Doel Santos and Ruchna Nigam August 24, 2021 at 3:00 AM 65 11 min. read
Personal VPN and Its Evasions: Risk Factors and How to Maintain Network Visibility 34,597 people reacted Personal VPN and Its Evasions: Risk Factors and How to Maintain Network Visibility By Saeed Abbasi and Kirti Parekh August 16, 2021 at 6:00 PM 45 7 min. read
Discovering CAPTCHA Protected Phishing Campaigns 41,160 people reacted Discovering CAPTCHA Protected Phishing Campaigns By Shresta Bellary Seetharam, Billy Melicher and Oleksii Starov August 13, 2021 at 12:00 PM 46 8 min. read
Using AI to Detect Malicious C2 Traffic 49,979 people reacted Using AI to Detect Malicious C2 Traffic By Ajaya Neupane and Stefan Achleitner May 24, 2021 at 6:00 AM 30 8 min. read
New Shameless Commodity Cryptocurrency Stealer (WeSteal) and Commodity RAT (WeControl) 50,664 people reacted New Shameless Commodity Cryptocurrency Stealer (WeSteal) and Commodity RAT (WeControl) By Robert Falcone and Simon Conant April 29, 2021 at 12:01 AM 35 9 min. read
Threat Assessment: Clop Ransomware 60,175 people reacted Threat Assessment: Clop Ransomware By Doel Santos April 13, 2021 at 8:00 AM 22 6 min. read
Network Attack Trends: Internet of Threats (November 2020-January 2021) 39,196 people reacted Network Attack Trends: Internet of Threats (November 2020-January 2021) By Lei Xu, Yue Guan and Vaibhav Singhal April 12, 2021 at 10:37 AM 31 8 min. read
Emotet Command and Control Case Study 41,946 people reacted Emotet Command and Control Case Study By Chris Navarrete and Yanhui Jia April 9, 2021 at 12:00 PM 13 9 min. read
Hancitor’s Use of Cobalt Strike and a Noisy Network Ping Tool 52,247 people reacted Hancitor’s Use of Cobalt Strike and a Noisy Network Ping Tool By Brad Duncan April 1, 2021 at 12:00 PM 30 11 min. read
Fake Websites Used in COVID-19 Themed Phishing Attacks, Impersonating Brands Like Pfizer and BioNTech 48,930 people reacted Fake Websites Used in COVID-19 Themed Phishing Attacks, Impersonating Brands Like Pfizer and BioNTech By Lucas Hu March 24, 2021 at 3:00 AM 36 12 min. read
Microsoft Exchange Server Attack Timeline 43,314 people reacted Microsoft Exchange Server Attack Timeline By Unit 42 March 11, 2021 at 12:10 PM 35 5 min. read
Fast Flux 101: How Cybercriminals Improve the Resilience of Their Infrastructure to Evade Detection and Law Enforcement Takedowns 89,776 people reacted Fast Flux 101: How Cybercriminals Improve the Resilience of Their Infrastructure to Evade Detection and Law Enforcement Takedowns By Janos Szurdi, Rebekah Houser and Daiping Liu March 2, 2021 at 6:00 AM 92 13 min. read
Network Attack Trends: Internet of Threats (August-October 2020) 36,909 people reacted Network Attack Trends: Internet of Threats (August-October 2020) By Yue Guan, Lei Xu, Ken Hsu and Zhibin Zhang January 22, 2021 at 6:00 AM 35 8 min. read
njRAT Spreading Through Active Pastebin Command and Control Tunnel 42,814 people reacted njRAT Spreading Through Active Pastebin Command and Control Tunnel By Yanhui Jia, Chris Navarrete and Haozhe Zhang December 9, 2020 at 6:00 AM 22 6 min. read