Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts created by: Aviv Sasson

Analyzing Web Application and API Attacks: The Cloud as a Target and a Launch PadA pictorial representation of web application and API attacks from the cloud
7,565
people reacted

Analyzing Web Application and API Attacks: The Cloud as a Target and a Launch Pad

  • By Aviv Sasson
  • June 2, 2023 at 6:00 AM

6

5 min. read

Digging Inside Azure Functions: HyperV Is the Last Line of DefenseA pictorial representation of many storage containers stacked together
51,464
people reacted

Digging Inside Azure Functions: HyperV Is the Last Line of Defense

  • By Daniel Prizmant and Aviv Sasson
  • December 15, 2022 at 6:00 AM

9

10 min. read

Trending

  • Analyzing Web Application and API Attacks: The Cloud as a Target and a Launch Pad by Aviv Sasson
FabricScape: Escaping Service Fabric and Taking Over the ClusterA conceptual image representing container security, including FabricScape, the container escape vulnerability discussed here.
60,945
people reacted

FabricScape: Escaping Service Fabric and Taking Over the Cluster

  • By Aviv Sasson
  • June 28, 2022 at 4:30 PM

38

10 min. read

Docker Honeypot Reveals Cryptojacking as Most Common Cloud ThreatA conceptual image representing Docker and related container security issues, such as those revealed by the Docker honeypot discussed here.
43,353
people reacted

Docker Honeypot Reveals Cryptojacking as Most Common Cloud Threat

  • By Aviv Sasson
  • May 27, 2021 at 12:00 PM

36

5 min. read

Unsecured Kubernetes Instances Could Be Vulnerable to ExploitationA conceptual image representing Kubernetes topics, including the unsecured Kubernetes instances discussed here.
43,835
people reacted

Unsecured Kubernetes Instances Could Be Vulnerable to Exploitation

  • By Jay Chen, Aviv Sasson and Ariel Zelivansky
  • April 23, 2021 at 5:40 PM

23

11 min. read

New Vulnerability Affecting Container Engines CRI-O and Podman (CVE-2021-20291)A conceptual image representing container security, such as that affected by CVE-2021-20291, discussed in this post
41,434
people reacted

New Vulnerability Affecting Container Engines CRI-O and Podman (CVE-2021-20291)

  • By Aviv Sasson
  • April 14, 2021 at 6:00 AM

21

4 min. read

20 Million Miners: Finding Malicious Cryptojacking Images in Docker HubThis conceptual image represents containers. Container images are a simple way to distribute software – and that can include the malicious cryptojacking images discussed here.
42,845
people reacted

20 Million Miners: Finding Malicious Cryptojacking Images in Docker Hub

  • By Aviv Sasson
  • March 26, 2021 at 6:00 AM

20

5 min. read

Hildegard: New TeamTNT Cryptojacking Malware Targeting KubernetesThis conceptual image covers the concept of container security. Attacks on containers, such as that of the Hildegard malware detailed here, can allow attackers access to a large amount of computing resources.
83,660
people reacted

Hildegard: New TeamTNT Cryptojacking Malware Targeting Kubernetes

  • By Jay Chen, Aviv Sasson and Ariel Zelivansky
  • February 3, 2021 at 6:00 AM

32

10 min. read

Pro-Ocean: Rocke Group’s New Cryptojacking Malware
41,688
people reacted

Pro-Ocean: Rocke Group’s New Cryptojacking Malware

  • By Aviv Sasson
  • January 28, 2021 at 6:00 AM

23

7 min. read

Cetus: Cryptojacking Worm Targeting Docker DaemonsCryptomining, as illustrated here, is one of the goals of Cetus, a cryptojacking worm.
31,224
people reacted

Cetus: Cryptojacking Worm Targeting Docker Daemons

  • By Aviv Sasson
  • August 27, 2020 at 6:00 AM

27

5 min. read

Rootless Containers: The Next Trend in Container Security
46,056
people reacted

Rootless Containers: The Next Trend in Container Security

  • By Aviv Sasson
  • May 26, 2020 at 6:00 AM

35

6 min. read

Critical Vulnerability in Harbor Enables Privilege Escalation from Zero to Admin (CVE-2019-16097)
70,845
people reacted

Critical Vulnerability in Harbor Enables Privilege Escalation from Zero to Admin (CVE-2019-16097)

  • By Aviv Sasson
  • September 18, 2019 at 1:06 PM

44

4 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.