Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts created by: Janos Szurdi

Domain Shadowing: A Stealthy Use of DNS Compromise for CybercrimeDNS security and issues such as domain shadowing are represented by the caution sign within a folder structure. Image includes Palo Alto Networks and Unit 42 logos.
62,962
people reacted

Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime

  • By Janos Szurdi, Rebekah Houser and Daiping Liu
  • September 21, 2022 at 6:00 AM

80

7 min. read

Tor 101: How Tor Works and its Risks to the EnterpriseConceptual image representing global traffic and information flow. Tor sometimes plays a role in efforts to conceal network traffic, both benign and malicious.
59,050
people reacted

Tor 101: How Tor Works and its Risks to the Enterprise

  • By Janos Szurdi
  • August 29, 2022 at 6:00 AM

59

14 min. read

Trending

  • Answers to Unit 42 Wireshark Quiz, January 2023 by Brad Duncan
  • Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats by Zhibin Zhang
  • Unit 42 Wireshark Quiz, January 2023 by Brad Duncan
  • Chinese PlugX Malware Hidden in Your USB Devices? by Mike Harbison
A Peek into Top-Level Domains and CybercrimeA conceptual image related to the domain name system, in this case applied to an analysis of top-level domains and malicious content.
57,470
people reacted

A Peek into Top-Level Domains and Cybercrime

  • By Janos Szurdi
  • November 11, 2021 at 6:00 AM

32

11 min. read

Fast Flux 101: How Cybercriminals Improve the Resilience of Their Infrastructure to Evade Detection and Law Enforcement TakedownsCybercriminals, conceptualized by this image of a man illicitly opening a door into a computer, use techniques such as fast flux, described here, to evade detection and law enforcement takedowns.
43,422
people reacted

Fast Flux 101: How Cybercriminals Improve the Resilience of Their Infrastructure to Evade Detection and Law Enforcement Takedowns

  • By Janos Szurdi, Rebekah Houser and Daiping Liu
  • March 2, 2021 at 6:00 AM

49

13 min. read

Domain Parking: A Gateway to Attackers Spreading Emotet and Impersonating McAfeeA conceptual image that illustrates the concepts of cybersquatting and domain parking, both of which can be abused by malicious actors to distribute malware, etc.
41,133
people reacted

Domain Parking: A Gateway to Attackers Spreading Emotet and Impersonating McAfee

  • By Ruian Duan, Zhanhao Chen, Seokkyung Chung, Janos Szurdi and Jingwei Fan
  • October 29, 2020 at 3:00 AM

28

11 min. read

Cybersquatting: Attackers Mimicking Domains of Major Brands Including Facebook, Apple, Amazon and Netflix to Scam ConsumersThis image illustrates the concept of cybersquatting, a practice used by cybercriminals to take advantage of well-known domain names and brands.
54,266
people reacted

Cybersquatting: Attackers Mimicking Domains of Major Brands Including Facebook, Apple, Amazon and Netflix to Scam Consumers

  • By Zhanhao Chen and Janos Szurdi
  • September 1, 2020 at 3:00 AM

30

17 min. read

Studying How Cybercriminals Prey on the COVID-19 Pandemic
52,706
people reacted

Studying How Cybercriminals Prey on the COVID-19 Pandemic

  • By Janos Szurdi, Zhanhao Chen, Oleksii Starov, Adrian McCabe and Ruian Duan
  • April 22, 2020 at 6:00 AM

46

19 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.