Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts created by: Bob Jung

Tailoring Sandbox Techniques to Hidden ThreatsA pictorial representation of malware that can be combated with tailored sandbox techniques
13,566
people reacted

Tailoring Sandbox Techniques to Hidden Threats

  • By Esmid Idrizovic, Bob Jung, Daniel Raygoza and Sean Hughes
  • March 20, 2023 at 6:00 AM

2

9 min. read

Machine Learning Versus Memory Resident EvilA pictorial representation of highly evasive malware, including sandbox evasion
53,471
people reacted

Machine Learning Versus Memory Resident Evil

  • By Akshata Rao, Esmid Idrizovic, Sujit Rokka Chhetri, Bob Jung and Mark Lim
  • January 31, 2023 at 6:00 AM

10

12 min. read

Trending

  • Finding Gozi: Answers to Unit 42 Wireshark Quiz, March 2023 by Brad Duncan
  • Threat Brief: 3CXDesktopApp Supply Chain Attack by Robert Falcone
Navigating the Vast Ocean of Sandbox EvasionsA pictorial depiction of a sandbox evasion
53,530
people reacted

Navigating the Vast Ocean of Sandbox Evasions

  • By Esmid Idrizovic, Bob Jung, Daniel Raygoza and Sean Hughes
  • December 27, 2022 at 6:00 AM

10

13 min. read

Blowing Cobalt Strike Out of the Water With Memory AnalysisConceptual image representing evasive malware such as Cobalt Strike
59,107
people reacted

Blowing Cobalt Strike Out of the Water With Memory Analysis

  • By Dominik Reichel, Esmid Idrizovic and Bob Jung
  • December 2, 2022 at 6:00 AM

19

15 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.