Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats 17,918 people reacted Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats By Yiheng An, Chao Lei, Adam Robbie, Aveek Das, Zhibin Zhang and Shehroze Farooqi January 24, 2023 at 6:00 AM 28 8 min. read
Answers to Unit 42 Wireshark Quiz, January 2023 9,303 people reacted Answers to Unit 42 Wireshark Quiz, January 2023 By Brad Duncan January 23, 2023 at 6:00 AM 4 6 min. read
Unit 42 Wireshark Quiz, January 2023 14,795 people reacted Unit 42 Wireshark Quiz, January 2023 By Brad Duncan January 20, 2023 at 6:00 AM 9 4 min. read
Network Security Trends: August-October 2022 17,331 people reacted Network Security Trends: August-October 2022 By Yiheng An January 12, 2023 at 6:00 AM 13 11 min. read
Threat Brief: OWASSRF Vulnerability Exploitation 40,866 people reacted Threat Brief: OWASSRF Vulnerability Exploitation By Robert Falcone and Lior Rochberger December 22, 2022 at 5:30 PM 11 9 min. read
Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine 55,031 people reacted Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine By Unit 42 December 20, 2022 at 3:00 AM 32 15 min. read
Threat Assessment: Luna Moth Callback Phishing Campaign 65,506 people reacted Threat Assessment: Luna Moth Callback Phishing Campaign By Kristopher Russo November 21, 2022 at 3:00 AM 16 8 min. read
An AI Based Solution to Detecting the DoubleZero .NET Wiper 52,518 people reacted An AI Based Solution to Detecting the DoubleZero .NET Wiper By Akshata Rao, Zong-Yu Wu and Wenjun Hu November 18, 2022 at 6:00 PM 8 7 min. read
Typhon Reborn With New Capabilities 54,212 people reacted Typhon Reborn With New Capabilities By Riley Porter and Uday Pratap Singh November 14, 2022 at 6:00 AM 7 7 min. read
Unit 42 Finds Three Vulnerabilities in OpenLiteSpeed Web Server 56,022 people reacted Unit 42 Finds Three Vulnerabilities in OpenLiteSpeed Web Server By Artur Avetisyan November 10, 2022 at 6:00 AM 8 5 min. read
Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild 65,384 people reacted Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild By Durgesh Sangvikar, Chris Navarrete, Matthew Tennis, Yanhui Jia, Yu Fu and Siddhart Shibiraj November 3, 2022 at 6:00 AM 22 9 min. read
Threat Brief: CVE-2022-3786 and CVE-2022-3602: OpenSSL X.509 Buffer Overflows 56,465 people reacted Threat Brief: CVE-2022-3786 and CVE-2022-3602: OpenSSL X.509 Buffer Overflows By Shawn Westfall November 2, 2022 at 6:00 PM 18 7 min. read
Defeating Guloader Anti-Analysis Technique 52,588 people reacted Defeating Guloader Anti-Analysis Technique By Mark Lim October 28, 2022 at 6:00 AM 8 5 min. read
Trends in Web Threats in CY Q2 2022: Malicious JavaScript Downloaders Are Evolving 49,221 people reacted Trends in Web Threats in CY Q2 2022: Malicious JavaScript Downloaders Are Evolving By Cecilia Hu, Tao Yan, Jin Chen and Taojie Wang October 26, 2022 at 6:00 AM 8 8 min. read
CNAME Cloaking: Disguising Third Parties Through the DNS 49,328 people reacted CNAME Cloaking: Disguising Third Parties Through the DNS By Rebekah Houser and Daiping Liu October 24, 2022 at 6:00 AM 5 10 min. read