Meddler-in-the-Middle Phishing Attacks Explained 65,570 people reacted Meddler-in-the-Middle Phishing Attacks Explained By Lucas Hu, Howard Tong, Suiqiang Deng and Alex Starov December 21, 2022 at 6:00 AM 23 10 min. read
Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine 80,953 people reacted Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine By Unit 42 December 20, 2022 at 3:00 AM 36 15 min. read
Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild 74,559 people reacted Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild By Durgesh Sangvikar, Chris Navarrete, Matthew Tennis, Yanhui Jia, Yu Fu and Siddhart Shibiraj November 3, 2022 at 6:00 AM 27 9 min. read
Trends in Web Threats in CY Q2 2022: Malicious JavaScript Downloaders Are Evolving 53,224 people reacted Trends in Web Threats in CY Q2 2022: Malicious JavaScript Downloaders Are Evolving By Cecilia Hu, Tao Yan, Jin Chen and Taojie Wang October 26, 2022 at 6:00 AM 9 8 min. read
CNAME Cloaking: Disguising Third Parties Through the DNS 57,316 people reacted CNAME Cloaking: Disguising Third Parties Through the DNS By Rebekah Houser and Daiping Liu October 24, 2022 at 6:00 AM 6 10 min. read
Trends in Web Threats: Old Web Skimmer Still Active Today 49,715 people reacted Trends in Web Threats: Old Web Skimmer Still Active Today By Cecilia Hu, Tao Yan, Zhanhao Chen, Jin Chen and Taojie Wang October 21, 2022 at 6:00 AM 9 9 min. read
Threat Brief: CVE-2022-41040 and CVE-2022-41082: Microsoft Exchange Server (ProxyNotShell) 80,841 people reacted Threat Brief: CVE-2022-41040 and CVE-2022-41082: Microsoft Exchange Server (ProxyNotShell) By Shawn Westfall October 4, 2022 at 4:30 PM 110 8 min. read
More Than Meets the Eye: Exposing a Polyglot File That Delivers IcedID 64,656 people reacted More Than Meets the Eye: Exposing a Polyglot File That Delivers IcedID By Mark Lim September 27, 2022 at 6:00 AM 71 4 min. read
Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime 69,545 people reacted Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime By Janos Szurdi, Rebekah Houser and Daiping Liu September 21, 2022 at 6:00 AM 81 7 min. read
BlueSky Ransomware: Fast Encryption via Multithreading 86,828 people reacted BlueSky Ransomware: Fast Encryption via Multithreading By Muhammad Umer Khan, Lee Wei, Yang Ji and Wenjun Hu August 10, 2022 at 12:00 PM 1142 7 min. read
Detecting Patient Zero Web Threats in Real Time With Advanced URL Filtering 44,359 people reacted Detecting Patient Zero Web Threats in Real Time With Advanced URL Filtering By Peng Peng, Fang Liu, Ben Zhang, Stefan Springer and Oleksii Starov December 9, 2021 at 6:00 AM 56 13 min. read
PhishingJS: A Deep Learning Model for JavaScript-Based Phishing Detection 42,691 people reacted PhishingJS: A Deep Learning Model for JavaScript-Based Phishing Detection By Lucas Hu September 10, 2021 at 6:00 AM 28 7 min. read
Discovering CAPTCHA Protected Phishing Campaigns 41,139 people reacted Discovering CAPTCHA Protected Phishing Campaigns By Shresta Bellary Seetharam, Billy Melicher and Oleksii Starov August 13, 2021 at 12:00 PM 46 8 min. read
Threat Assessment: WastedLocker Ransomware 47,367 people reacted Threat Assessment: WastedLocker Ransomware By Alex Hinchliffe, Doel Santos, Adrian McCabe and Robert Falcone July 30, 2020 at 6:00 AM 31 4 min. read
New Android Trojan “Xbot” Phishes Credit Cards and Bank Accounts, Encrypts Devices for Ransom By Cong Zheng, Claud Xiao and Zhi Xu February 18, 2016 at 4:00 PM 5 7 min. read