Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts created by: Aviv Sasson

Analyzing Web Application and API Attacks: The Cloud as a Target and a Launch PadA pictorial representation of web application and API attacks from the cloud
39,183
people reacted

Analyzing Web Application and API Attacks: The Cloud as a Target and a Launch Pad

  • By Aviv Sasson
  • June 2, 2023 at 6:00 AM

9

5 min. read

Digging Inside Azure Functions: HyperV Is the Last Line of DefenseA pictorial representation of many storage containers stacked together
52,383
people reacted

Digging Inside Azure Functions: HyperV Is the Last Line of Defense

  • By Daniel Prizmant and Aviv Sasson
  • December 15, 2022 at 6:00 AM

9

10 min. read

Trending

  • Hacking Employers and Seeking Employment: Two Job-Related Campaigns Bear Hallmarks of North Korean Threat Actors by Unit 42
  • Stately Taurus Targets the Philippines As Tensions Flare in the South Pacific by Unit 42
  • New Tool Set Found Used Against Organizations in the Middle East, Africa and the US by Samantha Stallings
  • In-Depth Analysis of July 2023 Exploit Chain Featuring CVE-2023-36884 and CVE-2023-36584 by Mike Harbison
  • Exploring a Critical Risk in Google Workspace's Domain-Wide Delegation Feature by Samantha Stallings
FabricScape: Escaping Service Fabric and Taking Over the ClusterA conceptual image representing container security, including FabricScape, the container escape vulnerability discussed here.
62,272
people reacted

FabricScape: Escaping Service Fabric and Taking Over the Cluster

  • By Aviv Sasson
  • June 28, 2022 at 4:30 PM

38

10 min. read

Docker Honeypot Reveals Cryptojacking as Most Common Cloud ThreatA conceptual image representing Docker and related container security issues, such as those revealed by the Docker honeypot discussed here.
44,228
people reacted

Docker Honeypot Reveals Cryptojacking as Most Common Cloud Threat

  • By Aviv Sasson
  • May 27, 2021 at 12:00 PM

37

5 min. read

Unsecured Kubernetes Instances Could Be Vulnerable to ExploitationA conceptual image representing Kubernetes topics, including the unsecured Kubernetes instances discussed here.
45,126
people reacted

Unsecured Kubernetes Instances Could Be Vulnerable to Exploitation

  • By Jay Chen, Aviv Sasson and Ariel Zelivansky
  • April 23, 2021 at 5:40 PM

24

11 min. read

New Vulnerability Affecting Container Engines CRI-O and Podman (CVE-2021-20291)A conceptual image representing container security, such as that affected by CVE-2021-20291, discussed in this post
42,357
people reacted

New Vulnerability Affecting Container Engines CRI-O and Podman (CVE-2021-20291)

  • By Aviv Sasson
  • April 14, 2021 at 6:00 AM

23

4 min. read

20 Million Miners: Finding Malicious Cryptojacking Images in Docker HubThis conceptual image represents containers. Container images are a simple way to distribute software – and that can include the malicious cryptojacking images discussed here.
44,160
people reacted

20 Million Miners: Finding Malicious Cryptojacking Images in Docker Hub

  • By Aviv Sasson
  • March 26, 2021 at 6:00 AM

23

5 min. read

Hildegard: New TeamTNT Cryptojacking Malware Targeting KubernetesThis conceptual image covers the concept of container security. Attacks on containers, such as that of the Hildegard malware detailed here, can allow attackers access to a large amount of computing resources.
86,256
people reacted

Hildegard: New TeamTNT Cryptojacking Malware Targeting Kubernetes

  • By Jay Chen, Aviv Sasson and Ariel Zelivansky
  • February 3, 2021 at 6:00 AM

33

10 min. read

Pro-Ocean: Rocke Group’s New Cryptojacking Malware
42,582
people reacted

Pro-Ocean: Rocke Group’s New Cryptojacking Malware

  • By Aviv Sasson
  • January 28, 2021 at 6:00 AM

24

7 min. read

Cetus: Cryptojacking Worm Targeting Docker DaemonsCryptomining, as illustrated here, is one of the goals of Cetus, a cryptojacking worm.
32,084
people reacted

Cetus: Cryptojacking Worm Targeting Docker Daemons

  • By Aviv Sasson
  • August 27, 2020 at 6:00 AM

27

5 min. read

Rootless Containers: The Next Trend in Container Security
47,058
people reacted

Rootless Containers: The Next Trend in Container Security

  • By Aviv Sasson
  • May 26, 2020 at 6:00 AM

36

6 min. read

Critical Vulnerability in Harbor Enables Privilege Escalation from Zero to Admin (CVE-2019-16097)
71,962
people reacted

Critical Vulnerability in Harbor Enables Privilege Escalation from Zero to Admin (CVE-2019-16097)

  • By Aviv Sasson
  • September 18, 2019 at 1:06 PM

45

4 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.