Muddled Libra’s Evolution to the Cloud 4,467 people reacted Muddled Libra’s Evolution to the Cloud By Margaret Zimmermann April 9, 2024 at 11:00 AM 16 10 min. read
Threat Brief: Vulnerability in XZ Utils Data Compression Library Impacting Multiple Linux Distributions (CVE-2024-3094) 37,304 people reacted Threat Brief: Vulnerability in XZ Utils Data Compression Library Impacting Multiple Linux Distributions (CVE-2024-3094) By Unit 42 March 30, 2024 at 7:15 PM 48 6 min. read
Exposing a New BOLA Vulnerability in Grafana 3,150 people reacted Exposing a New BOLA Vulnerability in Grafana By Ravid Mazon and Jay Chen March 27, 2024 at 7:00 AM 22 8 min. read
Curious Serpens’ FalseFont Backdoor: Technical Analysis, Detection and Prevention 4,664 people reacted Curious Serpens’ FalseFont Backdoor: Technical Analysis, Detection and Prevention By Tom Fakterman, Daniel Frank and Jerome Tujague March 21, 2024 at 3:00 AM 8 12 min. read
Inside the Rabbit Hole: BunnyLoader 3.0 Unveiled 6,733 people reacted Inside the Rabbit Hole: BunnyLoader 3.0 Unveiled By Amanda Tanner, Anthony Galiette and Jerome Tujague March 15, 2024 at 3:00 AM 13 16 min. read
Navigating the Cloud: Exploring Lateral Movement Techniques 7,710 people reacted Navigating the Cloud: Exploring Lateral Movement Techniques By Eden Elazar February 28, 2024 at 3:00 AM 27 12 min. read
Intruders in the Library: Exploring DLL Hijacking 4,670 people reacted Intruders in the Library: Exploring DLL Hijacking By Tom Fakterman, Chen Erlich and Assaf Dahan February 22, 2024 at 4:00 PM 12 14 min. read
Threat Brief: Attacks on Critical Infrastructure Attributed to Insidious Taurus (Volt Typhoon) 58,186 people reacted Threat Brief: Attacks on Critical Infrastructure Attributed to Insidious Taurus (Volt Typhoon) By Unit 42 February 14, 2024 at 2:30 PM 28 9 min. read
Diving Into Glupteba's UEFI Bootkit 6,756 people reacted Diving Into Glupteba's UEFI Bootkit By Lior Rochberger and Dan Yashnik February 12, 2024 at 6:00 AM 12 12 min. read
Ransomware Retrospective 2024: Unit 42 Leak Site Analysis 9,994 people reacted Ransomware Retrospective 2024: Unit 42 Leak Site Analysis By Doel Santos February 5, 2024 at 3:00 AM 18 17 min. read
Medusa Ransomware Turning Your Files into Stone 12,070 people reacted Medusa Ransomware Turning Your Files into Stone By Anthony Galiette and Doel Santos January 11, 2024 at 6:00 AM 17 16 min. read
Dual Privilege Escalation Chain: Exploiting Monitoring and Service Mesh Configurations and Privileges in GKE to Gain Unauthorized Access in Kubernetes 6,945 people reacted Dual Privilege Escalation Chain: Exploiting Monitoring and Service Mesh Configurations and Privileges in GKE to Gain Unauthorized Access in Kubernetes By Shaul Ben Hai December 27, 2023 at 6:00 AM 33 11 min. read
Exploring a Critical Risk in Google Workspace's Domain-Wide Delegation Feature 5,403 people reacted Exploring a Critical Risk in Google Workspace's Domain-Wide Delegation Feature By Zohar Zigdon November 30, 2023 at 3:00 PM 19 10 min. read
In-Depth Analysis of July 2023 Exploit Chain Featuring CVE-2023-36884 and CVE-2023-36584 11,145 people reacted In-Depth Analysis of July 2023 Exploit Chain Featuring CVE-2023-36884 and CVE-2023-36584 By Eli Birkan, Dan Yashnik, Oriel Cochavi, Bar Lahav and Mike Harbison November 13, 2023 at 3:00 AM 79 18 min. read
Chinese APT Targeting Cambodian Government 11,808 people reacted Chinese APT Targeting Cambodian Government By Unit 42 November 7, 2023 at 9:01 PM 49 5 min. read