Threat Brief: Citrix Bleed CVE-2023-4966 6,451 people reacted Threat Brief: Citrix Bleed CVE-2023-4966 By Unit 42 November 1, 2023 at 3:00 PM 16 5 min. read
Over the Kazuar’s Nest: Cracking Down on a Freshly Hatched Backdoor Used by Pensive Ursa (Aka Turla) 5,868 people reacted Over the Kazuar’s Nest: Cracking Down on a Freshly Hatched Backdoor Used by Pensive Ursa (Aka Turla) By Daniel Frank and Tom Fakterman October 31, 2023 at 6:00 AM 14 20 min. read
Threat Brief - MOVEit Transfer SQL Injection Vulnerabilities: CVE-2023-34362, CVE-2023-35036 and CVE-2023-35708 (Updated Oct 4) 49,574 people reacted Threat Brief - MOVEit Transfer SQL Injection Vulnerabilities: CVE-2023-34362, CVE-2023-35036 and CVE-2023-35708 (Updated Oct 4) By Unit 42 October 4, 2023 at 6:00 AM 66 10 min. read
Threat Group Assessment: Muddled Libra (Updated) 30,117 people reacted Threat Group Assessment: Muddled Libra (Updated) By Kristopher Russo, Austin Dever and Amer Elsad September 15, 2023 at 6:00 AM 20 11 min. read
When a Zero Day and Access Keys Collide in the Cloud: Responding to the SugarCRM Zero-Day Vulnerability 5,755 people reacted When a Zero Day and Access Keys Collide in the Cloud: Responding to the SugarCRM Zero-Day Vulnerability By Margaret Zimmermann August 10, 2023 at 3:15 PM 16 13 min. read
NodeStealer 2.0 – The Python Version: Stealing Facebook Business Accounts 6,745 people reacted NodeStealer 2.0 – The Python Version: Stealing Facebook Business Accounts By Lior Rochberger August 1, 2023 at 6:00 AM 13 14 min. read
CVE-2023-36884 - Microsoft Office and Windows HTML Remote Code Execution: Threat Brief (Updated) 22,872 people reacted CVE-2023-36884 - Microsoft Office and Windows HTML Remote Code Execution: Threat Brief (Updated) By Unit 42 July 12, 2023 at 11:45 AM 30 4 min. read
Diplomats Beware: Cloaked Ursa Phishing With a Twist 11,926 people reacted Diplomats Beware: Cloaked Ursa Phishing With a Twist By Unit 42 July 12, 2023 at 3:00 AM 19 15 min. read
Chinese PlugX Malware Hidden in Your USB Devices? 80,644 people reacted Chinese PlugX Malware Hidden in Your USB Devices? By Mike Harbison and Jen Miller-Osborn January 26, 2023 at 6:00 AM 18 12 min. read
Threat Brief: OWASSRF Vulnerability Exploitation 64,642 people reacted Threat Brief: OWASSRF Vulnerability Exploitation By Robert Falcone and Lior Rochberger December 22, 2022 at 5:30 PM 15 9 min. read
Compromised Cloud Compute Credentials: Case Studies From the Wild 54,537 people reacted Compromised Cloud Compute Credentials: Case Studies From the Wild By Dror Alon December 8, 2022 at 3:00 PM 46 9 min. read
Vice Society: Profiling a Persistent Threat to the Education Sector 71,226 people reacted Vice Society: Profiling a Persistent Threat to the Education Sector By JR Gumarin December 6, 2022 at 3:00 AM 38 13 min. read
Threat Assessment: Luna Moth Callback Phishing Campaign 73,648 people reacted Threat Assessment: Luna Moth Callback Phishing Campaign By Kristopher Russo November 21, 2022 at 3:00 AM 20 8 min. read
Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild 72,701 people reacted Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild By Durgesh Sangvikar, Chris Navarrete, Matthew Tennis, Yanhui Jia, Yu Fu and Siddhart Shibiraj November 3, 2022 at 6:00 AM 26 9 min. read
Ransom Cartel Ransomware: A Possible Connection With REvil 72,625 people reacted Ransom Cartel Ransomware: A Possible Connection With REvil By Amer Elsad and Daniel Bunce October 14, 2022 at 6:00 AM 22 17 min. read