• Tools
  • ATOMs
  • About Us

Posts created by: Jay Chen

This conceptual image covers the concept of container security. Attacks on containers, such as that of the Hildegard malware detailed here, can allow attackers access to a large amount of computing resources.
38,628
people reacted

Hildegard: New TeamTNT Cryptojacking Malware Targeting Kubernetes

  • By Jay Chen, Aviv Sasson and Ariel Zelivansky
  • February 3, 2021 at 6:00 AM

24

10 min. read

A conceptual image illustrating finding vulnerabilities on the web. IAMFinder is a custom open source tool that can help organizations identify information leakage in AWS accounts.
27,813
people reacted

IAMFinder: Open Source Tool to Identify Information Leaked from AWS IAM Reconnaissance

  • By Jay Chen
  • November 19, 2020 at 12:00 PM

21

6 min. read

Trending

  • Threat Assessment: Active Exploitation of Four Zero-Day Vulnerabilities in Microsoft Exchange Server
  • Ransomware Threat Assessments: A Companion to the 2021 Unit 42 Ransomware Threat Report
  • Satori: Mirai Botnet Variant Targeting Vantage Velocity Field Unit RCE Vulnerability
  • Winter 2020 Network Attack Trends: Internet of Threats
  • Highlights from the 2021 Unit 42 Ransomware Threat Report
This conceptual image illustrates some of the security and configuration issues involved with the cloud, such as the issue with AWS resource-based policy APIs discussed here.
35,857
people reacted

Information Leakage in AWS Resource-Based Policy APIs

  • By Jay Chen
  • November 17, 2020 at 3:00 AM

14

6 min. read

The conceptual image illustrates the idea of the risks that misconfigured IAM roles can pose for cloud workloads.
25,816
people reacted

Unit 42 Cloud Threat Report: Misconfigured IAM Roles Lead to Thousands of Compromised Cloud Workloads

  • By Jay Chen
  • October 8, 2020 at 6:00 AM

14

15 min. read

This conceptual image illustrates trends in cybersecurity
22,312
people reacted

The State of Exploit Development: 80% of Exploits Publish Faster than CVEs

  • By Jay Chen
  • August 26, 2020 at 6:00 AM

10

8 min. read

25,916
people reacted

COVID-19: Cloud Threat Landscape

  • By Jay Chen
  • May 4, 2020 at 6:00 AM

13

6 min. read

29,041
people reacted

Unit 42 CTR: Leaked Code from Docker Registries

  • By Jay Chen
  • February 7, 2020 at 6:00 AM

24

7 min. read

23,457
people reacted

Attacker’s Tactics and Techniques in Unsecured Docker Daemons Revealed

  • By Jay Chen
  • January 29, 2020 at 6:00 AM

18

10 min. read

21,782
people reacted

Server-Side Request Forgery Exposes Data of Technology, Industrial and Media Organizations

  • By Jay Chen
  • November 26, 2019 at 6:00 AM

21

9 min. read

58,851
people reacted

Graboid: First-Ever Cryptojacking Worm Found in Images on Docker Hub

  • By Jay Chen
  • October 16, 2019 at 6:00 AM

27

6 min. read

50,908
people reacted

Hunting the Public Cloud for Exposed Hosts and Misconfigurations

  • By Jay Chen
  • August 12, 2019 at 6:00 AM

27

11 min. read

57,579
people reacted

Making Containers More Isolated: An Overview of Sandboxed Container Technologies

  • By Jay Chen
  • June 6, 2019 at 6:00 AM

26

15 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2021 Palo Alto Networks, Inc. All rights reserved.