Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts created by: Daiping Liu

CNAME Cloaking: Disguising Third Parties Through the DNSDNS security conceptual image, covering concepts including CNAME cloaking
49,361
people reacted

CNAME Cloaking: Disguising Third Parties Through the DNS

  • By Rebekah Houser and Daiping Liu
  • October 24, 2022 at 6:00 AM

5

10 min. read

Detecting Emerging Network Threats From Newly Observed DomainsDNS security conceptual image, covering topics including malicious newly observed domains
49,559
people reacted

Detecting Emerging Network Threats From Newly Observed Domains

  • By Zhanhao Chen, Daiping Liu, Wanjin Li and Fan Fei
  • October 17, 2022 at 6:00 AM

7

8 min. read

Trending

  • Machine Learning Versus Memory Resident Evil by Esmid Idrizovic
Domain Shadowing: A Stealthy Use of DNS Compromise for CybercrimeDNS security and issues such as domain shadowing are represented by the caution sign within a folder structure. Image includes Palo Alto Networks and Unit 42 logos.
63,185
people reacted

Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime

  • By Janos Szurdi, Rebekah Houser and Daiping Liu
  • September 21, 2022 at 6:00 AM

80

7 min. read

Strategically Aged Domain Detection: Capture APT Attacks With DNS Traffic TrendsA conceptual image representing DNS security, such as the strategically aged domain detection system discussed here.
48,124
people reacted

Strategically Aged Domain Detection: Capture APT Attacks With DNS Traffic Trends

  • By Zhanhao Chen, Daiping Liu, Wanjin Li and Jielong Xu
  • December 29, 2021 at 6:00 AM

42

9 min. read

Play Your Cards Right: Detecting Wildcard DNS AbuseA conceptual image representing attacks on DNS, including the Wildcard DNS abuse discussed here.
38,344
people reacted

Play Your Cards Right: Detecting Wildcard DNS Abuse

  • By Rebekah Houser and Daiping Liu
  • December 1, 2021 at 6:00 AM

20

10 min. read

Attackers Are Taking Advantage of the Open-Source Service Interactsh for Malicious PurposesA conceptual image representing alerts on vulnerabilities and exploits, such as the monitoring that revealed exploit attempts that traced to malicious use of the Interactsh tool.
67,012
people reacted

Attackers Are Taking Advantage of the Open-Source Service Interactsh for Malicious Purposes

  • By Yue Guan, Jin Chen, Leo Olson, Wayne Xin and Daiping Liu
  • October 14, 2021 at 6:00 AM

46

7 min. read

Dangling Domains: Security Threats, Detection and PrevalenceA conceptual image representing exploitation of DNS, such as an often overlooked issue discussed in this blog, dangling domains, which can be exploited for DNS hijacking.
46,428
people reacted

Dangling Domains: Security Threats, Detection and Prevalence

  • By Daiping Liu and Ruian Duan
  • September 16, 2021 at 6:00 AM

23

12 min. read

Detecting and Preventing Malicious Domains Proactively with DNS SecurityA conceptual image representing malicious domains, such as those that can be identified by the proactive detector discussed in this piece.
36,963
people reacted

Detecting and Preventing Malicious Domains Proactively with DNS Security

  • By Zhanhao Chen and Daiping Liu
  • May 4, 2021 at 6:00 AM

23

11 min. read

Fast Flux 101: How Cybercriminals Improve the Resilience of Their Infrastructure to Evade Detection and Law Enforcement TakedownsCybercriminals, conceptualized by this image of a man illicitly opening a door into a computer, use techniques such as fast flux, described here, to evade detection and law enforcement takedowns.
44,505
people reacted

Fast Flux 101: How Cybercriminals Improve the Resilience of Their Infrastructure to Evade Detection and Law Enforcement Takedowns

  • By Janos Szurdi, Rebekah Houser and Daiping Liu
  • March 2, 2021 at 6:00 AM

49

13 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.