Chinese PlugX Malware Hidden in Your USB Devices? 76,419 people reacted Chinese PlugX Malware Hidden in Your USB Devices? By Mike Harbison and Jen Miller-Osborn January 26, 2023 at 6:00 AM 16 12 min. read
Threat Brief: OWASSRF Vulnerability Exploitation 62,994 people reacted Threat Brief: OWASSRF Vulnerability Exploitation By Robert Falcone and Lior Rochberger December 22, 2022 at 5:30 PM 12 9 min. read
Compromised Cloud Compute Credentials: Case Studies From the Wild 52,306 people reacted Compromised Cloud Compute Credentials: Case Studies From the Wild By Dror Alon December 8, 2022 at 3:00 PM 42 9 min. read
Vice Society: Profiling a Persistent Threat to the Education Sector 68,441 people reacted Vice Society: Profiling a Persistent Threat to the Education Sector By JR Gumarin December 6, 2022 at 3:00 AM 26 13 min. read
Threat Assessment: Luna Moth Callback Phishing Campaign 70,918 people reacted Threat Assessment: Luna Moth Callback Phishing Campaign By Kristopher Russo November 21, 2022 at 3:00 AM 19 8 min. read
Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild 69,629 people reacted Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild By Durgesh Sangvikar, Chris Navarrete, Matthew Tennis, Yanhui Jia, Yu Fu and Siddhart Shibiraj November 3, 2022 at 6:00 AM 23 9 min. read
Ransom Cartel Ransomware: A Possible Connection With REvil 70,440 people reacted Ransom Cartel Ransomware: A Possible Connection With REvil By Amer Elsad and Daniel Bunce October 14, 2022 at 6:00 AM 21 17 min. read
Attackers Move Quickly to Exploit High-Profile Zero Days: Insights From the 2022 Unit 42 Incident Response Report 83,622 people reacted Attackers Move Quickly to Exploit High-Profile Zero Days: Insights From the 2022 Unit 42 Incident Response Report By Unit 42 July 26, 2022 at 3:00 AM 83 4 min. read
Breaking Down Ransomware Attacks 39,310 people reacted Breaking Down Ransomware Attacks By Jeremy Brown and Ashlie Blanca May 21, 2021 at 6:00 PM 10 6 min. read