Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Category: Malware

Machine Learning Versus Memory Resident EvilA pictorial representation of highly evasive malware, including sandbox evasion
5,236
people reacted

Machine Learning Versus Memory Resident Evil

  • By Akshata Rao, Esmid Idrizovic, Sujit Rokka Chhetri, Bob Jung and Mark Lim
  • January 31, 2023 at 6:00 AM

4

12 min. read

Chinese PlugX Malware Hidden in Your USB Devices?A conceptual image representing malware, including PlugX
21,898
people reacted

Chinese PlugX Malware Hidden in Your USB Devices?

  • By Mike Harbison and Jen Miller-Osborn
  • January 26, 2023 at 6:00 AM

12

12 min. read

Trending

  • Machine Learning Versus Memory Resident Evil by Esmid Idrizovic
Navigating the Vast Ocean of Sandbox EvasionsA pictorial depiction of a sandbox evasion
31,923
people reacted

Navigating the Vast Ocean of Sandbox Evasions

  • By Esmid Idrizovic, Bob Jung, Daniel Raygoza and Sean Hughes
  • December 27, 2022 at 6:00 AM

8

13 min. read

Meddler-in-the-Middle Phishing Attacks ExplainedA pictorial representation of a meddler-in-the-middle phishing attack
38,685
people reacted

Meddler-in-the-Middle Phishing Attacks Explained

  • By Lucas Hu, Howard Tong, Suiqiang Deng and Alex Starov
  • December 21, 2022 at 6:00 AM

11

10 min. read

Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of UkraineA pictorial representation of Trident Ursa showing a purple bear and trident
55,045
people reacted

Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine

  • By Unit 42
  • December 20, 2022 at 3:00 AM

32

15 min. read

Blowing Cobalt Strike Out of the Water With Memory AnalysisConceptual image representing evasive malware such as Cobalt Strike
53,544
people reacted

Blowing Cobalt Strike Out of the Water With Memory Analysis

  • By Dominik Reichel, Esmid Idrizovic and Bob Jung
  • December 2, 2022 at 6:00 AM

18

15 min. read

An AI Based Solution to Detecting the DoubleZero .NET WiperConceptual image representing malware detection, including the machine learning model that can analyze the DoubleZero .NET wiper.
52,520
people reacted

An AI Based Solution to Detecting the DoubleZero .NET Wiper

  • By Akshata Rao, Zong-Yu Wu and Wenjun Hu
  • November 18, 2022 at 6:00 PM

8

7 min. read

Typhon Reborn With New CapabilitiesMalware conceptual image, covering variants such as Typhon Reborn
54,214
people reacted

Typhon Reborn With New Capabilities

  • By Riley Porter and Uday Pratap Singh
  • November 14, 2022 at 6:00 AM

7

7 min. read

Banking Trojan Techniques: How Financially Motivated Malware Became InfrastructureBanking Trojan techniques conceptual image
60,078
people reacted

Banking Trojan Techniques: How Financially Motivated Malware Became Infrastructure

  • By Or Chechik
  • October 31, 2022 at 6:00 AM

12

10 min. read

Defeating Guloader Anti-Analysis TechniqueMalware conceptual image, including types of malware such as the Guloader variant covered here.
52,588
people reacted

Defeating Guloader Anti-Analysis Technique

  • By Mark Lim
  • October 28, 2022 at 6:00 AM

8

5 min. read

Trends in Web Threats in CY Q2 2022: Malicious JavaScript Downloaders Are EvolvingTrends conceptual image, covering web threat trends such as the evolution of a malicious JavaScript downloader.
49,221
people reacted

Trends in Web Threats in CY Q2 2022: Malicious JavaScript Downloaders Are Evolving

  • By Cecilia Hu, Tao Yan, Jin Chen and Taojie Wang
  • October 26, 2022 at 6:00 AM

8

8 min. read

CNAME Cloaking: Disguising Third Parties Through the DNSDNS security conceptual image, covering concepts including CNAME cloaking
49,329
people reacted

CNAME Cloaking: Disguising Third Parties Through the DNS

  • By Rebekah Houser and Daiping Liu
  • October 24, 2022 at 6:00 AM

5

10 min. read

Trends in Web Threats: Old Web Skimmer Still Active TodayWeb Threat Trends conceptual image
46,440
people reacted

Trends in Web Threats: Old Web Skimmer Still Active Today

  • By Cecilia Hu, Tao Yan, Zhanhao Chen, Jin Chen and Taojie Wang
  • October 21, 2022 at 6:00 AM

8

9 min. read

Detecting Emerging Network Threats From Newly Observed DomainsDNS security conceptual image, covering topics including malicious newly observed domains
49,533
people reacted

Detecting Emerging Network Threats From Newly Observed Domains

  • By Zhanhao Chen, Daiping Liu, Wanjin Li and Fan Fei
  • October 17, 2022 at 6:00 AM

7

8 min. read

More Than Meets the Eye: Exposing a Polyglot File That Delivers IcedIDConceptual image representing malware, such as the information stealer IcedID, being delivered by a polyglot file.
58,778
people reacted

More Than Meets the Eye: Exposing a Polyglot File That Delivers IcedID

  • By Mark Lim
  • September 27, 2022 at 6:00 AM

70

4 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.