Threat Group Assessment: Muddled Libra (Updated) 36,662 people reacted Threat Group Assessment: Muddled Libra (Updated) By Kristopher Russo, Austin Dever and Amer Elsad March 8, 2024 at 2:58 PM 40 13 min. read
Why Is an Australian Footballer Collecting My Passwords? The Various Ways Malicious JavaScript Can Steal Your Secrets 5,261 people reacted Why Is an Australian Footballer Collecting My Passwords? The Various Ways Malicious JavaScript Can Steal Your Secrets By Billy Melicher, Nabeel Mohamed and Alex Starov December 20, 2023 at 3:00 AM 36 9 min. read
Toward Ending the Domain Wars: Early Detection of Malicious Stockpiled Domains 5,458 people reacted Toward Ending the Domain Wars: Early Detection of Malicious Stockpiled Domains By Janos Szurdi, Shehroze Farooqi and Nabeel Mohamed December 15, 2023 at 3:00 PM 34 13 min. read
NodeStealer 2.0 – The Python Version: Stealing Facebook Business Accounts 7,637 people reacted NodeStealer 2.0 – The Python Version: Stealing Facebook Business Accounts By Lior Rochberger August 1, 2023 at 6:00 AM 13 14 min. read
Diplomats Beware: Cloaked Ursa Phishing With a Twist 13,618 people reacted Diplomats Beware: Cloaked Ursa Phishing With a Twist By Unit 42 July 12, 2023 at 3:00 AM 19 15 min. read
Recent Trends in Internet Threats: Common Industries Impersonated in Phishing Attacks, Web Skimmer Analysis and More 66,321 people reacted Recent Trends in Internet Threats: Common Industries Impersonated in Phishing Attacks, Web Skimmer Analysis and More By Cecilia Hu, Fang Liu, Shehroze Farooqi, Stella Zhu, Daiping Liu, Jodie Ma, Jingwei Fan and Tao Yan April 28, 2023 at 6:00 AM 18 10 min. read
ChatGPT-Themed Scam Attacks Are on the Rise 90,559 people reacted ChatGPT-Themed Scam Attacks Are on the Rise By Peng Peng, Zhanhao Chen and Lucas Hu April 20, 2023 at 3:00 AM 31 6 min. read
Threat Actors Rapidly Adopt Web3 IPFS Technology 78,402 people reacted Threat Actors Rapidly Adopt Web3 IPFS Technology By Amanda Tanner, Kristopher Bleich, Anthony Galiette and Joseph Opacki April 19, 2023 at 6:00 AM 9 16 min. read
Meddler-in-the-Middle Phishing Attacks Explained 65,585 people reacted Meddler-in-the-Middle Phishing Attacks Explained By Lucas Hu, Howard Tong, Suiqiang Deng and Alex Starov December 21, 2022 at 6:00 AM 23 10 min. read
Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine 80,967 people reacted Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine By Unit 42 December 20, 2022 at 3:00 AM 36 15 min. read
Threat Assessment: Luna Moth Callback Phishing Campaign 75,112 people reacted Threat Assessment: Luna Moth Callback Phishing Campaign By Kristopher Russo November 21, 2022 at 3:00 AM 21 8 min. read
Detecting Emerging Network Threats From Newly Observed Domains 53,420 people reacted Detecting Emerging Network Threats From Newly Observed Domains By Zhanhao Chen, Daiping Liu, Wanjin Li and Fan Fei October 17, 2022 at 6:00 AM 8 8 min. read
Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime 69,556 people reacted Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime By Janos Szurdi, Rebekah Houser and Daiping Liu September 21, 2022 at 6:00 AM 81 7 min. read
Legitimate SaaS Platforms Being Used to Host Phishing Attacks 69,369 people reacted Legitimate SaaS Platforms Being Used to Host Phishing Attacks By Lucas Hu August 23, 2022 at 6:00 AM 44 7 min. read
Flight of the Bumblebee: Email Lures and File Sharing Services Lead to Malware 82,129 people reacted Flight of the Bumblebee: Email Lures and File Sharing Services Lead to Malware By Brad Duncan August 3, 2022 at 12:00 PM 58 8 min. read