Showing page 1351 of 1360 of 1750 results.

Blog
A tool to help organizations scan their Citrix ADC appliances for evidence of post-exploitation activity related to CVE-2023-3519.
Blog
We discuss SAIGON, banking malware most likely based on the source code of the v3 variant of Ursnif.
Blog
Tracking threat groups over time is an important tool to help defenders hunt for evil on networks and conduct effective incident response. Knowing how certain groups operate makes for an efficient investigation and assists in easily identifying threat actor activity.
Blog
One of the main goals of evaluating a ransomware sample is to determine what kind of cryptography the sample uses, and that's exactly what we did for BLACKMATTER ransomware.
Blog
Zero-day exploitation of vulnerabilities beginning as early as December 2023 by a suspected espionage threat actor.
Blog
A suspected Chinese actor used a zero-day vulnerability in FortiOS and multiple custom malware families as part of an espionage campaign.
Blog
Our analysis of documents detailing previous Russian investments and considerations to scale cyber operations and capability development.
Blog
UNC4841 has continued to show sophistication and adaptability in response to Barracuda ESG zero-day remediation efforts.