Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts created by: Jin Chen

Trends in Web Threats in CY Q2 2022: Malicious JavaScript Downloaders Are EvolvingTrends conceptual image, covering web threat trends such as the evolution of a malicious JavaScript downloader.
49,220
people reacted

Trends in Web Threats in CY Q2 2022: Malicious JavaScript Downloaders Are Evolving

  • By Cecilia Hu, Tao Yan, Jin Chen and Taojie Wang
  • October 26, 2022 at 6:00 AM

8

8 min. read

Trends in Web Threats: Old Web Skimmer Still Active TodayWeb Threat Trends conceptual image
46,440
people reacted

Trends in Web Threats: Old Web Skimmer Still Active Today

  • By Cecilia Hu, Tao Yan, Zhanhao Chen, Jin Chen and Taojie Wang
  • October 21, 2022 at 6:00 AM

8

9 min. read

Trending

  • Machine Learning Versus Memory Resident Evil by Esmid Idrizovic
Zero-Day Exploit Detection Using Machine LearningConceptual image representing zero-day exploit detection using machine learning.
54,575
people reacted

Zero-Day Exploit Detection Using Machine Learning

  • By Jin Chen, Lei Xu, Andrew Guan, Zhibin Zhang and Yu Fu
  • September 16, 2022 at 6:00 AM

88

10 min. read

Trends in Web Threats: Attackers Were More Active During Holiday SeasonA conceptual image representing trends, including the trends in web threats discussed here, including trends in web threats landing URLs and web threats malicious host URLs
29,954
people reacted

Trends in Web Threats: Attackers Were More Active During Holiday Season

  • By Cecilia Hu, Tao Yan, Jin Chen and Taojie Wang
  • April 11, 2022 at 6:00 AM

18

10 min. read

The Year in Web Threats: Web Skimmers Take Advantage of Cloud Hosting and MoreA conceptual image representing cybercrime, such as the web skimmers discussed in this piece on top web threats.
39,582
people reacted

The Year in Web Threats: Web Skimmers Take Advantage of Cloud Hosting and More

  • By Cecilia Hu, Tao Yan, Taojie Wang and Jin Chen
  • January 13, 2022 at 6:00 PM

19

8 min. read

A New Web Skimmer Campaign Targets Real Estate Websites Through Attacking Cloud Video Distribution Supply ChainA conceptual image representing malicious code, such as the web skimmer malicious JavaScript code injected into video as described here.
62,273
people reacted

A New Web Skimmer Campaign Targets Real Estate Websites Through Attacking Cloud Video Distribution Supply Chain

  • By Taojie Wang, Jin Chen and Tao Yan
  • January 3, 2022 at 12:00 PM

22

10 min. read

Attackers Are Taking Advantage of the Open-Source Service Interactsh for Malicious PurposesA conceptual image representing alerts on vulnerabilities and exploits, such as the monitoring that revealed exploit attempts that traced to malicious use of the Interactsh tool.
66,964
people reacted

Attackers Are Taking Advantage of the Open-Source Service Interactsh for Malicious Purposes

  • By Yue Guan, Jin Chen, Leo Olson, Wayne Xin and Daiping Liu
  • October 14, 2021 at 6:00 AM

46

7 min. read

Exploitation of Windows RDP Vulnerability CVE-2019-0708 (BlueKeep): Get RCE with System Privilege Using Refresh Rect PDU and RDPDR Client Name Request PDUThe conceptual image illustrates the concept of an exploit, such as that described here for Windows RDP Vulnerability CVE-2019-0708 (BlueKeep).
38,286
people reacted

Exploitation of Windows RDP Vulnerability CVE-2019-0708 (BlueKeep): Get RCE with System Privilege Using Refresh Rect PDU and RDPDR Client Name Request PDU

  • By Tao Yan and Jin Chen
  • December 7, 2020 at 6:00 AM

29

10 min. read

A Closer Look at the Web SkimmerA conceptual illustration representing malware
31,029
people reacted

A Closer Look at the Web Skimmer

  • By Jin Chen, Tao Yan, Taojie Wang and Yu Fu
  • November 9, 2020 at 6:00 AM

20

7 min. read

Top Alexa Sites Infected With Malicious Coinminers and Web SkimmerVulnerabilities in websites, as conceptualized in this image, can include malicious coinminers and web skimmers.
31,992
people reacted

Top Alexa Sites Infected With Malicious Coinminers and Web Skimmer

  • By Taojie Wang, Jin Chen, Tao Yan and Zhanglin He
  • October 1, 2020 at 6:00 AM

26

8 min. read

Script-Based Malware: A New Attacker Trend on Internet ExplorerThis conceptual image represents Remote Access Trojans, such as the one examined here as an example of script-based malware.
38,646
people reacted

Script-Based Malware: A New Attacker Trend on Internet Explorer

  • By Edouard Bochin, Tao Yan, Jin Chen and Fang Liu
  • August 11, 2020 at 6:00 AM

34

10 min. read

Anatomy of Formjacking Attacks
29,232
people reacted

Anatomy of Formjacking Attacks

  • By Jin Chen, Tao Yan, Taojie Wang and Zhanglin He
  • April 27, 2020 at 4:00 PM

22

8 min. read

Web-Based Threats: First Half 2019
31,549
people reacted

Web-Based Threats: First Half 2019

  • By Fang Liu, Tao Yan, Jin Chen, Rongbo Shao, Zhanglin He and Bo Qu
  • November 1, 2019 at 6:00 AM

28

8 min. read

Exploitation of Windows CVE-2019-0708 (BlueKeep): Three Ways to Write Data into Kernel with RDP PDU
92,970
people reacted

Exploitation of Windows CVE-2019-0708 (BlueKeep): Three Ways to Write Data into Kernel with RDP PDU

  • By Tao Yan and Jin Chen
  • August 29, 2019 at 6:00 AM

71

13 min. read

36,850
people reacted

Analysis of the DHCP Client Script Code Execution Vulnerability (CVE-2018-1111)

  • By Jin Chen
  • July 16, 2018 at 5:00 AM

10

6 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.