Recent Trends in Internet Threats: Common Industries Impersonated in Phishing Attacks, Web Skimmer Analysis and More 40,216 people reacted Recent Trends in Internet Threats: Common Industries Impersonated in Phishing Attacks, Web Skimmer Analysis and More By Cecilia Hu, Fang Liu, Shehroze Farooqi, Stella Zhu, Daiping Liu, Jodie Ma, Jingwei Fan and Tao Yan April 28, 2023 at 6:00 AM 14 10 min. read
Chinese Alloy Taurus Updates PingPull Malware 53,970 people reacted Chinese Alloy Taurus Updates PingPull Malware By Unit 42 April 26, 2023 at 3:00 AM 15 6 min. read
ChatGPT-Themed Scam Attacks Are on the Rise 62,664 people reacted ChatGPT-Themed Scam Attacks Are on the Rise By Peng Peng, Zhanhao Chen and Lucas Hu April 20, 2023 at 3:00 AM 26 6 min. read
Threat Actors Rapidly Adopt Web3 IPFS Technology 56,650 people reacted Threat Actors Rapidly Adopt Web3 IPFS Technology By Amanda Tanner, Kristopher Bleich, Anthony Galiette and Joseph Opacki April 19, 2023 at 6:00 AM 7 16 min. read
Malicious JavaScript Injection Campaign Infects 51k Websites 69,057 people reacted Malicious JavaScript Injection Campaign Infects 51k Websites By Shehroze Farooqi, Billy Melicher, Brody Kutt and Alex Starov March 23, 2023 at 6:00 AM 18 7 min. read
GoBruteforcer: Golang-Based Botnet Actively Harvests Web Servers 66,972 people reacted GoBruteforcer: Golang-Based Botnet Actively Harvests Web Servers By Siddharth Sharma, Yang Ji, Anmol Maurya and Dongrui Zeng March 10, 2023 at 6:00 AM 16 7 min. read
Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats 64,418 people reacted Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats By Yiheng An, Chao Lei, Adam Robbie, Aveek Das, Zhibin Zhang and Shehroze Farooqi January 24, 2023 at 6:00 AM 37 8 min. read
Chinese Playful Taurus Activity in Iran 72,374 people reacted Chinese Playful Taurus Activity in Iran By Unit 42 January 18, 2023 at 3:00 AM 66 9 min. read
Threat Brief: OWASSRF Vulnerability Exploitation 63,008 people reacted Threat Brief: OWASSRF Vulnerability Exploitation By Robert Falcone and Lior Rochberger December 22, 2022 at 5:30 PM 12 9 min. read
Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine 76,313 people reacted Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine By Unit 42 December 20, 2022 at 3:00 AM 34 15 min. read
Trends in Web Threats in CY Q2 2022: Malicious JavaScript Downloaders Are Evolving 51,734 people reacted Trends in Web Threats in CY Q2 2022: Malicious JavaScript Downloaders Are Evolving By Cecilia Hu, Tao Yan, Jin Chen and Taojie Wang October 26, 2022 at 6:00 AM 9 8 min. read
CNAME Cloaking: Disguising Third Parties Through the DNS 52,677 people reacted CNAME Cloaking: Disguising Third Parties Through the DNS By Rebekah Houser and Daiping Liu October 24, 2022 at 6:00 AM 6 10 min. read
Detecting Emerging Network Threats From Newly Observed Domains 51,713 people reacted Detecting Emerging Network Threats From Newly Observed Domains By Zhanhao Chen, Daiping Liu, Wanjin Li and Fan Fei October 17, 2022 at 6:00 AM 8 8 min. read
More Than Meets the Eye: Exposing a Polyglot File That Delivers IcedID 62,617 people reacted More Than Meets the Eye: Exposing a Polyglot File That Delivers IcedID By Mark Lim September 27, 2022 at 6:00 AM 70 4 min. read
Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime 66,628 people reacted Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime By Janos Szurdi, Rebekah Houser and Daiping Liu September 21, 2022 at 6:00 AM 80 7 min. read