Chinese PlugX Malware Hidden in Your USB Devices? 22,819 people reacted Chinese PlugX Malware Hidden in Your USB Devices? By Mike Harbison and Jen Miller-Osborn January 26, 2023 at 6:00 AM 12 12 min. read
Threat Brief: OWASSRF Vulnerability Exploitation 41,436 people reacted Threat Brief: OWASSRF Vulnerability Exploitation By Robert Falcone and Lior Rochberger December 22, 2022 at 5:30 PM 11 9 min. read
Compromised Cloud Compute Credentials: Case Studies From the Wild 46,277 people reacted Compromised Cloud Compute Credentials: Case Studies From the Wild By Dror Alon December 8, 2022 at 3:00 PM 36 9 min. read
Vice Society: Profiling a Persistent Threat to the Education Sector 55,813 people reacted Vice Society: Profiling a Persistent Threat to the Education Sector By JR Gumarin December 6, 2022 at 3:00 AM 10 13 min. read
Threat Assessment: Luna Moth Callback Phishing Campaign 65,577 people reacted Threat Assessment: Luna Moth Callback Phishing Campaign By Kristopher Russo November 21, 2022 at 3:00 AM 16 8 min. read
Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild 65,425 people reacted Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild By Durgesh Sangvikar, Chris Navarrete, Matthew Tennis, Yanhui Jia, Yu Fu and Siddhart Shibiraj November 3, 2022 at 6:00 AM 22 9 min. read
Ransom Cartel Ransomware: A Possible Connection With REvil 66,574 people reacted Ransom Cartel Ransomware: A Possible Connection With REvil By Amer Elsad and Daniel Bunce October 14, 2022 at 6:00 AM 21 17 min. read
Attackers Move Quickly to Exploit High-Profile Zero Days: Insights From the 2022 Unit 42 Incident Response Report 80,204 people reacted Attackers Move Quickly to Exploit High-Profile Zero Days: Insights From the 2022 Unit 42 Incident Response Report By Unit 42 July 26, 2022 at 3:00 AM 83 4 min. read
Breaking Down Ransomware Attacks 35,365 people reacted Breaking Down Ransomware Attacks By Jeremy Brown and Ashlie Blanca May 21, 2021 at 6:00 PM 10 6 min. read