Large-Scale StrelaStealer Campaign in Early 2024 8,634 people reacted Large-Scale StrelaStealer Campaign in Early 2024 By Benjamin Chang, Goutam Tripathy, Pranay Kumar Chhaparwal, Anmol Maurya and Vishwa Thothathri March 22, 2024 at 3:00 AM 30 8 min. read
The Art of Domain Deception: Bifrost's New Tactic to Deceive Users 6,882 people reacted The Art of Domain Deception: Bifrost's New Tactic to Deceive Users By Anmol Maurya and Siddharth Sharma February 29, 2024 at 3:00 AM 114 6 min. read
When PAM Goes Rogue: Malware Uses Authentication Modules for Mischief 5,759 people reacted When PAM Goes Rogue: Malware Uses Authentication Modules for Mischief By Siddharth Sharma October 26, 2023 at 6:00 AM 63 4 min. read
Leveraging a Hooking Framework to Expand Malware Detection Coverage on the Android Platform 4,296 people reacted Leveraging a Hooking Framework to Expand Malware Detection Coverage on the Android Platform By Lee Wei Yeong, Xingjiali Zhang, Yang Ji and Wenjun Hu October 6, 2023 at 6:00 AM 15 13 min. read
Navigating the Vast Ocean of Sandbox Evasions 57,997 people reacted Navigating the Vast Ocean of Sandbox Evasions By Esmid Idrizovic, Bob Jung, Daniel Raygoza and Sean Hughes December 27, 2022 at 6:00 AM 10 13 min. read
Blowing Cobalt Strike Out of the Water With Memory Analysis 74,110 people reacted Blowing Cobalt Strike Out of the Water With Memory Analysis By Dominik Reichel, Esmid Idrizovic and Bob Jung December 2, 2022 at 6:00 AM 24 15 min. read
Ransomware Families: 2021 Data to Supplement the Unit 42 Ransomware Threat Report 46,493 people reacted Ransomware Families: 2021 Data to Supplement the Unit 42 Ransomware Threat Report By Guang Qing He, Cecil Liu, Aiden Huang and Royce Lu July 28, 2021 at 6:00 AM 56 7 min. read
Evade Sandboxes With a Single Bit – the Trap Flag 40,116 people reacted Evade Sandboxes With a Single Bit – the Trap Flag By Mark Lim July 19, 2021 at 3:30 PM 35 5 min. read