Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats 7,443 people reacted Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats By Yiheng An, Chao Lei, Adam Robbie, Aveek Das, Zhibin Zhang and Shehroze Farooqi January 24, 2023 at 6:00 AM 19 8 min. read
Chinese Playful Taurus Activity in Iran 16,522 people reacted Chinese Playful Taurus Activity in Iran By Unit 42 January 18, 2023 at 3:00 AM 22 9 min. read
Threat Brief: OWASSRF Vulnerability Exploitation 35,884 people reacted Threat Brief: OWASSRF Vulnerability Exploitation By Robert Falcone and Lior Rochberger December 22, 2022 at 5:30 PM 11 9 min. read
Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine 49,388 people reacted Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine By Unit 42 December 20, 2022 at 3:00 AM 31 15 min. read
Trends in Web Threats in CY Q2 2022: Malicious JavaScript Downloaders Are Evolving 49,045 people reacted Trends in Web Threats in CY Q2 2022: Malicious JavaScript Downloaders Are Evolving By Cecilia Hu, Tao Yan, Jin Chen and Taojie Wang October 26, 2022 at 6:00 AM 8 8 min. read
CNAME Cloaking: Disguising Third Parties Through the DNS 49,144 people reacted CNAME Cloaking: Disguising Third Parties Through the DNS By Rebekah Houser and Daiping Liu October 24, 2022 at 6:00 AM 5 10 min. read
Detecting Emerging Network Threats From Newly Observed Domains 49,410 people reacted Detecting Emerging Network Threats From Newly Observed Domains By Zhanhao Chen, Daiping Liu, Wanjin Li and Fan Fei October 17, 2022 at 6:00 AM 7 8 min. read
More Than Meets the Eye: Exposing a Polyglot File That Delivers IcedID 58,513 people reacted More Than Meets the Eye: Exposing a Polyglot File That Delivers IcedID By Mark Lim September 27, 2022 at 6:00 AM 70 4 min. read
Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime 62,962 people reacted Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime By Janos Szurdi, Rebekah Houser and Daiping Liu September 21, 2022 at 6:00 AM 80 7 min. read
Russia’s Gamaredon aka Primitive Bear APT Group Actively Targeting Ukraine 112,720 people reacted Russia’s Gamaredon aka Primitive Bear APT Group Actively Targeting Ukraine By Unit 42 February 3, 2022 at 1:00 PM 63 15 min. read
Strategically Aged Domain Detection: Capture APT Attacks With DNS Traffic Trends 47,921 people reacted Strategically Aged Domain Detection: Capture APT Attacks With DNS Traffic Trends By Zhanhao Chen, Daiping Liu, Wanjin Li and Jielong Xu December 29, 2021 at 6:00 AM 42 9 min. read
Play Your Cards Right: Detecting Wildcard DNS Abuse 38,212 people reacted Play Your Cards Right: Detecting Wildcard DNS Abuse By Rebekah Houser and Daiping Liu December 1, 2021 at 6:00 AM 20 10 min. read
Dangling Domains: Security Threats, Detection and Prevalence 46,213 people reacted Dangling Domains: Security Threats, Detection and Prevalence By Daiping Liu and Ruian Duan September 16, 2021 at 6:00 AM 23 12 min. read
DNS Rebinding Attack: How Malicious Websites Exploit Private Networks 64,226 people reacted DNS Rebinding Attack: How Malicious Websites Exploit Private Networks By Zhanhao Chen August 31, 2021 at 6:00 AM 42 13 min. read
Discovering CAPTCHA Protected Phishing Campaigns 36,793 people reacted Discovering CAPTCHA Protected Phishing Campaigns By Shresta Bellary Seetharam, Billy Melicher and Oleksii Starov August 13, 2021 at 12:00 PM 45 8 min. read