Recent Trends in Internet Threats: Common Industries Impersonated in Phishing Attacks, Web Skimmer Analysis and More 39,476 people reacted Recent Trends in Internet Threats: Common Industries Impersonated in Phishing Attacks, Web Skimmer Analysis and More By Cecilia Hu, Fang Liu, Shehroze Farooqi, Stella Zhu, Daiping Liu, Jodie Ma, Jingwei Fan and Tao Yan April 28, 2023 at 6:00 AM 14 10 min. read
ChatGPT-Themed Scam Attacks Are on the Rise 61,871 people reacted ChatGPT-Themed Scam Attacks Are on the Rise By Peng Peng, Zhanhao Chen and Lucas Hu April 20, 2023 at 3:00 AM 26 6 min. read
Threat Actors Rapidly Adopt Web3 IPFS Technology 55,908 people reacted Threat Actors Rapidly Adopt Web3 IPFS Technology By Amanda Tanner, Kristopher Bleich, Anthony Galiette and Joseph Opacki April 19, 2023 at 6:00 AM 7 16 min. read
Meddler-in-the-Middle Phishing Attacks Explained 61,365 people reacted Meddler-in-the-Middle Phishing Attacks Explained By Lucas Hu, Howard Tong, Suiqiang Deng and Alex Starov December 21, 2022 at 6:00 AM 14 10 min. read
Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine 76,287 people reacted Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine By Unit 42 December 20, 2022 at 3:00 AM 34 15 min. read
Threat Assessment: Luna Moth Callback Phishing Campaign 70,913 people reacted Threat Assessment: Luna Moth Callback Phishing Campaign By Kristopher Russo November 21, 2022 at 3:00 AM 19 8 min. read
Detecting Emerging Network Threats From Newly Observed Domains 51,705 people reacted Detecting Emerging Network Threats From Newly Observed Domains By Zhanhao Chen, Daiping Liu, Wanjin Li and Fan Fei October 17, 2022 at 6:00 AM 8 8 min. read
Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime 66,611 people reacted Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime By Janos Szurdi, Rebekah Houser and Daiping Liu September 21, 2022 at 6:00 AM 80 7 min. read
Legitimate SaaS Platforms Being Used to Host Phishing Attacks 67,320 people reacted Legitimate SaaS Platforms Being Used to Host Phishing Attacks By Lucas Hu August 23, 2022 at 6:00 AM 41 7 min. read
Flight of the Bumblebee: Email Lures and File Sharing Services Lead to Malware 80,131 people reacted Flight of the Bumblebee: Email Lures and File Sharing Services Lead to Malware By Brad Duncan August 3, 2022 at 12:00 PM 56 8 min. read
Emotet Summary: November 2021 Through January 2022 49,314 people reacted Emotet Summary: November 2021 Through January 2022 By Brad Duncan May 17, 2022 at 6:00 AM 22 13 min. read
Spear Phishing Attacks Target Organizations in Ukraine, Payloads Include the Document Stealer OutSteel and the Downloader SaintBot 60,168 people reacted Spear Phishing Attacks Target Organizations in Ukraine, Payloads Include the Document Stealer OutSteel and the Downloader SaintBot By Unit 42 February 25, 2022 at 5:30 PM 32 21 min. read
New Emotet Infection Method 66,151 people reacted New Emotet Infection Method By Saqib Khanzada, Tyler Halfpop, Micah Yates and Brad Duncan February 15, 2022 at 6:00 AM 23 5 min. read
Strategically Aged Domain Detection: Capture APT Attacks With DNS Traffic Trends 51,365 people reacted Strategically Aged Domain Detection: Capture APT Attacks With DNS Traffic Trends By Zhanhao Chen, Daiping Liu, Wanjin Li and Jielong Xu December 29, 2021 at 6:00 AM 43 9 min. read
Detecting Patient Zero Web Threats in Real Time With Advanced URL Filtering 42,624 people reacted Detecting Patient Zero Web Threats in Real Time With Advanced URL Filtering By Peng Peng, Fang Liu, Ben Zhang, Stefan Springer and Oleksii Starov December 9, 2021 at 6:00 AM 51 13 min. read