Trends in Web Threats in CY Q2 2022: Malicious JavaScript Downloaders Are Evolving 53,280 people reacted Trends in Web Threats in CY Q2 2022: Malicious JavaScript Downloaders Are Evolving By Cecilia Hu, Tao Yan, Jin Chen and Taojie Wang October 26, 2022 at 6:00 AM 9 8 min. read
Trends in Web Threats: Old Web Skimmer Still Active Today 49,769 people reacted Trends in Web Threats: Old Web Skimmer Still Active Today By Cecilia Hu, Tao Yan, Zhanhao Chen, Jin Chen and Taojie Wang October 21, 2022 at 6:00 AM 9 9 min. read
Threat Brief: CVE-2022-41040 and CVE-2022-41082: Microsoft Exchange Server (ProxyNotShell) 80,934 people reacted Threat Brief: CVE-2022-41040 and CVE-2022-41082: Microsoft Exchange Server (ProxyNotShell) By Shawn Westfall October 4, 2022 at 4:30 PM 110 8 min. read
More Than Meets the Eye: Exposing a Polyglot File That Delivers IcedID 64,765 people reacted More Than Meets the Eye: Exposing a Polyglot File That Delivers IcedID By Mark Lim September 27, 2022 at 6:00 AM 71 4 min. read
Zero-Day Exploit Detection Using Machine Learning 59,355 people reacted Zero-Day Exploit Detection Using Machine Learning By Jin Chen, Lei Xu, Andrew Guan, Zhibin Zhang and Yu Fu September 16, 2022 at 6:00 AM 91 10 min. read
OriginLogger: A Look at Agent Tesla’s Successor 72,829 people reacted OriginLogger: A Look at Agent Tesla’s Successor By Jeff White September 13, 2022 at 6:00 AM 48 14 min. read
Novel News on Cuba Ransomware: Greetings From Tropical Scorpius 92,657 people reacted Novel News on Cuba Ransomware: Greetings From Tropical Scorpius By Anthony Galiette, Daniel Bunce, Doel Santos and Shawn Westfall August 9, 2022 at 9:00 AM 81 20 min. read
Flight of the Bumblebee: Email Lures and File Sharing Services Lead to Malware 82,179 people reacted Flight of the Bumblebee: Email Lures and File Sharing Services Lead to Malware By Brad Duncan August 3, 2022 at 12:00 PM 58 8 min. read
Digium Phones Under Attack: Insight Into the Web Shell Implant 57,761 people reacted Digium Phones Under Attack: Insight Into the Web Shell Implant By Lee Wei, Yang Ji, Muhammad Umer Khan and Wenjun Hu July 15, 2022 at 6:00 AM 1057 7 min. read
There Is More Than One Way to Sleep: Dive Deep Into the Implementations of API Hammering by Various Malware Families 51,389 people reacted There Is More Than One Way to Sleep: Dive Deep Into the Implementations of API Hammering by Various Malware Families By Mark Lim and Riley Porter June 24, 2022 at 6:00 AM 31 5 min. read
Russia-Ukraine Cyberattacks (Updated): How to Protect Against Related Cyberthreats Including DDoS, HermeticWiper, Gamaredon, Website Defacement, Phishing and Scams 130,560 people reacted Russia-Ukraine Cyberattacks (Updated): How to Protect Against Related Cyberthreats Including DDoS, HermeticWiper, Gamaredon, Website Defacement, Phishing and Scams By Unit 42 February 22, 2022 at 3:00 PM 331 13 min. read
Threat Brief: Ongoing Russia and Ukraine Cyber Activity 88,028 people reacted Threat Brief: Ongoing Russia and Ukraine Cyber Activity By Robert Falcone, Mike Harbison and Josh Grunzweig January 20, 2022 at 12:30 PM 55 8 min. read
DNS Rebinding Attack: How Malicious Websites Exploit Private Networks 87,760 people reacted DNS Rebinding Attack: How Malicious Websites Exploit Private Networks By Zhanhao Chen August 31, 2021 at 6:00 AM 46 13 min. read
THOR: Previously Unseen PlugX Variant Deployed During Microsoft Exchange Server Attacks by PKPLUG Group 88,734 people reacted THOR: Previously Unseen PlugX Variant Deployed During Microsoft Exchange Server Attacks by PKPLUG Group By Mike Harbison and Alex Hinchliffe July 27, 2021 at 12:00 PM 55 13 min. read
Evade Sandboxes With a Single Bit – the Trap Flag 40,194 people reacted Evade Sandboxes With a Single Bit – the Trap Flag By Mark Lim July 19, 2021 at 3:30 PM 35 5 min. read