Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts created by: Bob Jung

Teasing the Secrets From Threat Actors: Malware Configuration Parsing at ScaleA pictorial representation of malware configuration data such as that used by IcedID
35,367
people reacted

Teasing the Secrets From Threat Actors: Malware Configuration Parsing at Scale

  • By Mark Lim, Daniel Raygoza and Bob Jung
  • May 3, 2023 at 6:00 AM

4

9 min. read

Tailoring Sandbox Techniques to Hidden ThreatsA pictorial representation of malware that can be combated with tailored sandbox techniques
51,187
people reacted

Tailoring Sandbox Techniques to Hidden Threats

  • By Esmid Idrizovic, Bob Jung, Daniel Raygoza and Sean Hughes
  • March 20, 2023 at 6:00 AM

4

9 min. read

Trending

  • Threat Brief: Attacks on Critical Infrastructure Attributed to Volt Typhoon by Unit 42
  • Cold as Ice: Unit 42 Wireshark Quiz for IcedID by Brad Duncan
  • Old Wine in the New Bottle: Mirai Variant Targets Multiple IoT Devices by Zhibin Zhang
  • Cold as Ice: Answers to Unit 42 Wireshark Quiz for IcedID by Brad Duncan
Machine Learning Versus Memory Resident EvilA pictorial representation of highly evasive malware, including sandbox evasion
62,276
people reacted

Machine Learning Versus Memory Resident Evil

  • By Akshata Rao, Esmid Idrizovic, Sujit Rokka Chhetri, Bob Jung and Mark Lim
  • January 31, 2023 at 6:00 AM

10

12 min. read

Navigating the Vast Ocean of Sandbox EvasionsA pictorial depiction of a sandbox evasion
55,183
people reacted

Navigating the Vast Ocean of Sandbox Evasions

  • By Esmid Idrizovic, Bob Jung, Daniel Raygoza and Sean Hughes
  • December 27, 2022 at 6:00 AM

10

13 min. read

Blowing Cobalt Strike Out of the Water With Memory AnalysisConceptual image representing evasive malware such as Cobalt Strike
65,428
people reacted

Blowing Cobalt Strike Out of the Water With Memory Analysis

  • By Dominik Reichel, Esmid Idrizovic and Bob Jung
  • December 2, 2022 at 6:00 AM

21

15 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.