Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts created by: Janos Szurdi

Domain Shadowing: A Stealthy Use of DNS Compromise for CybercrimeDNS security and issues such as domain shadowing are represented by the caution sign within a folder structure. Image includes Palo Alto Networks and Unit 42 logos.
66,609
people reacted

Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime

  • By Janos Szurdi, Rebekah Houser and Daiping Liu
  • September 21, 2022 at 6:00 AM

80

7 min. read

Tor 101: How Tor Works and its Risks to the EnterpriseConceptual image representing global traffic and information flow. Tor sometimes plays a role in efforts to conceal network traffic, both benign and malicious.
62,482
people reacted

Tor 101: How Tor Works and its Risks to the Enterprise

  • By Janos Szurdi
  • August 29, 2022 at 6:00 AM

60

14 min. read

Trending

  • Threat Brief: Attacks on Critical Infrastructure Attributed to Volt Typhoon by Unit 42
  • Cold as Ice: Unit 42 Wireshark Quiz for IcedID by Brad Duncan
  • Old Wine in the New Bottle: Mirai Variant Targets Multiple IoT Devices by Zhibin Zhang
  • Cold as Ice: Answers to Unit 42 Wireshark Quiz for IcedID by Brad Duncan
A Peek into Top-Level Domains and CybercrimeA conceptual image related to the domain name system, in this case applied to an analysis of top-level domains and malicious content.
64,221
people reacted

A Peek into Top-Level Domains and Cybercrime

  • By Janos Szurdi
  • November 11, 2021 at 6:00 AM

35

11 min. read

Fast Flux 101: How Cybercriminals Improve the Resilience of Their Infrastructure to Evade Detection and Law Enforcement TakedownsCybercriminals, conceptualized by this image of a man illicitly opening a door into a computer, use techniques such as fast flux, described here, to evade detection and law enforcement takedowns.
59,138
people reacted

Fast Flux 101: How Cybercriminals Improve the Resilience of Their Infrastructure to Evade Detection and Law Enforcement Takedowns

  • By Janos Szurdi, Rebekah Houser and Daiping Liu
  • March 2, 2021 at 6:00 AM

57

13 min. read

Domain Parking: A Gateway to Attackers Spreading Emotet and Impersonating McAfeeA conceptual image that illustrates the concepts of cybersquatting and domain parking, both of which can be abused by malicious actors to distribute malware, etc.
45,032
people reacted

Domain Parking: A Gateway to Attackers Spreading Emotet and Impersonating McAfee

  • By Ruian Duan, Zhanhao Chen, Seokkyung Chung, Janos Szurdi and Jingwei Fan
  • October 29, 2020 at 3:00 AM

29

11 min. read

Cybersquatting: Attackers Mimicking Domains of Major Brands Including Facebook, Apple, Amazon and Netflix to Scam ConsumersThis image illustrates the concept of cybersquatting, a practice used by cybercriminals to take advantage of well-known domain names and brands.
59,109
people reacted

Cybersquatting: Attackers Mimicking Domains of Major Brands Including Facebook, Apple, Amazon and Netflix to Scam Consumers

  • By Zhanhao Chen and Janos Szurdi
  • September 1, 2020 at 3:00 AM

32

17 min. read

Studying How Cybercriminals Prey on the COVID-19 Pandemic
55,051
people reacted

Studying How Cybercriminals Prey on the COVID-19 Pandemic

  • By Janos Szurdi, Zhanhao Chen, Oleksii Starov, Adrian McCabe and Ruian Duan
  • April 22, 2020 at 6:00 AM

46

19 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.