Meddler-in-the-Middle Phishing Attacks Explained 61,377 people reacted Meddler-in-the-Middle Phishing Attacks Explained By Lucas Hu, Howard Tong, Suiqiang Deng and Alex Starov December 21, 2022 at 6:00 AM 14 10 min. read
Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine 76,300 people reacted Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine By Unit 42 December 20, 2022 at 3:00 AM 34 15 min. read
Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild 69,629 people reacted Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild By Durgesh Sangvikar, Chris Navarrete, Matthew Tennis, Yanhui Jia, Yu Fu and Siddhart Shibiraj November 3, 2022 at 6:00 AM 23 9 min. read
Trends in Web Threats in CY Q2 2022: Malicious JavaScript Downloaders Are Evolving 51,728 people reacted Trends in Web Threats in CY Q2 2022: Malicious JavaScript Downloaders Are Evolving By Cecilia Hu, Tao Yan, Jin Chen and Taojie Wang October 26, 2022 at 6:00 AM 9 8 min. read
CNAME Cloaking: Disguising Third Parties Through the DNS 52,663 people reacted CNAME Cloaking: Disguising Third Parties Through the DNS By Rebekah Houser and Daiping Liu October 24, 2022 at 6:00 AM 6 10 min. read
Trends in Web Threats: Old Web Skimmer Still Active Today 48,379 people reacted Trends in Web Threats: Old Web Skimmer Still Active Today By Cecilia Hu, Tao Yan, Zhanhao Chen, Jin Chen and Taojie Wang October 21, 2022 at 6:00 AM 9 9 min. read
Threat Brief: CVE-2022-41040 and CVE-2022-41082: Microsoft Exchange Server (ProxyNotShell) 77,796 people reacted Threat Brief: CVE-2022-41040 and CVE-2022-41082: Microsoft Exchange Server (ProxyNotShell) By Shawn Westfall October 4, 2022 at 4:30 PM 110 8 min. read
More Than Meets the Eye: Exposing a Polyglot File That Delivers IcedID 62,607 people reacted More Than Meets the Eye: Exposing a Polyglot File That Delivers IcedID By Mark Lim September 27, 2022 at 6:00 AM 70 4 min. read
Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime 66,614 people reacted Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime By Janos Szurdi, Rebekah Houser and Daiping Liu September 21, 2022 at 6:00 AM 80 7 min. read
BlueSky Ransomware: Fast Encryption via Multithreading 84,001 people reacted BlueSky Ransomware: Fast Encryption via Multithreading By Muhammad Umer Khan, Lee Wei, Yang Ji and Wenjun Hu August 10, 2022 at 12:00 PM 1140 7 min. read
Detecting Patient Zero Web Threats in Real Time With Advanced URL Filtering 42,628 people reacted Detecting Patient Zero Web Threats in Real Time With Advanced URL Filtering By Peng Peng, Fang Liu, Ben Zhang, Stefan Springer and Oleksii Starov December 9, 2021 at 6:00 AM 51 13 min. read
PhishingJS: A Deep Learning Model for JavaScript-Based Phishing Detection 40,808 people reacted PhishingJS: A Deep Learning Model for JavaScript-Based Phishing Detection By Lucas Hu September 10, 2021 at 6:00 AM 25 7 min. read
Discovering CAPTCHA Protected Phishing Campaigns 39,248 people reacted Discovering CAPTCHA Protected Phishing Campaigns By Shresta Bellary Seetharam, Billy Melicher and Oleksii Starov August 13, 2021 at 12:00 PM 45 8 min. read
Threat Assessment: WastedLocker Ransomware 45,719 people reacted Threat Assessment: WastedLocker Ransomware By Alex Hinchliffe, Doel Santos, Adrian McCabe and Robert Falcone July 30, 2020 at 6:00 AM 30 4 min. read
New Android Trojan “Xbot” Phishes Credit Cards and Bank Accounts, Encrypts Devices for Ransom By Cong Zheng, Claud Xiao and Zhi Xu February 18, 2016 at 4:00 PM 5 7 min. read