Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Category: Unit 42

CNAME Cloaking: Disguising Third Parties Through the DNSDNS security conceptual image, covering concepts including CNAME cloaking
49,148
people reacted

CNAME Cloaking: Disguising Third Parties Through the DNS

  • By Rebekah Houser and Daiping Liu
  • October 24, 2022 at 6:00 AM

5

10 min. read

Threat Assessment: Black Basta Ransomware
71,723
people reacted

Threat Assessment: Black Basta Ransomware

  • By Amer Elsad
  • August 25, 2022 at 12:00 PM

53

12 min. read

Trending

  • Answers to Unit 42 Wireshark Quiz, January 2023 by Brad Duncan
  • Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats by Zhibin Zhang
  • Unit 42 Wireshark Quiz, January 2023 by Brad Duncan
  • Chinese PlugX Malware Hidden in Your USB Devices? by Mike Harbison
The Year in Web Threats: Web Skimmers Take Advantage of Cloud Hosting and MoreA conceptual image representing cybercrime, such as the web skimmers discussed in this piece on top web threats.
39,010
people reacted

The Year in Web Threats: Web Skimmers Take Advantage of Cloud Hosting and More

  • By Cecilia Hu, Tao Yan, Taojie Wang and Jin Chen
  • January 13, 2022 at 6:00 PM

19

8 min. read

A New Web Skimmer Campaign Targets Real Estate Websites Through Attacking Cloud Video Distribution Supply ChainA conceptual image representing malicious code, such as the web skimmer malicious JavaScript code injected into video as described here.
61,577
people reacted

A New Web Skimmer Campaign Targets Real Estate Websites Through Attacking Cloud Video Distribution Supply Chain

  • By Taojie Wang, Jin Chen and Tao Yan
  • January 3, 2022 at 12:00 PM

22

10 min. read

Strategically Aged Domain Detection: Capture APT Attacks With DNS Traffic TrendsA conceptual image representing DNS security, such as the strategically aged domain detection system discussed here.
47,922
people reacted

Strategically Aged Domain Detection: Capture APT Attacks With DNS Traffic Trends

  • By Zhanhao Chen, Daiping Liu, Wanjin Li and Jielong Xu
  • December 29, 2021 at 6:00 AM

42

9 min. read

Network Security Trends: August-October 2021A conceptual image representing network security trends, such as the analysis of network attacks for August-October 2021 provided here.
38,872
people reacted

Network Security Trends: August-October 2021

  • By Yue Guan
  • December 21, 2021 at 12:00 PM

40

10 min. read

Another Apache Log4j Vulnerability Is Actively Exploited in the Wild (CVE-2021-44228) (Updated)A conceptual image representing a vulnerability, such as the Apache log4j remote code execution vulnerability discussed here, CVE-2021-44228.
292,518
people reacted

Another Apache Log4j Vulnerability Is Actively Exploited in the Wild (CVE-2021-44228) (Updated)

  • By Tao Yan, Qi Deng, Haozhe Zhang, Yu Fu, Josh Grunzweig, Mike Harbison and Robert Falcone
  • December 10, 2021 at 1:00 PM

468

15 min. read

Detecting Patient Zero Web Threats in Real Time With Advanced URL FilteringA conceptual image representing problems on the web, such as the patient zero web threats discussed here.
40,559
people reacted

Detecting Patient Zero Web Threats in Real Time With Advanced URL Filtering

  • By Peng Peng, Fang Liu, Ben Zhang, Stefan Springer and Oleksii Starov
  • December 9, 2021 at 6:00 AM

50

13 min. read

APT Expands Attack on ManageEngine With Active Campaign Against ServiceDesk PlusA conceptual image symbolizing cybercrime and the use of backdoors, such as the activity we observed in an APT's TiltedTemple Campaign against ManageEngine ServiceDesk Plus, as discussed here.
59,089
people reacted

APT Expands Attack on ManageEngine With Active Campaign Against ServiceDesk Plus

  • By Robert Falcone and Peter Renals
  • December 2, 2021 at 6:00 AM

19

10 min. read

Play Your Cards Right: Detecting Wildcard DNS AbuseA conceptual image representing attacks on DNS, including the Wildcard DNS abuse discussed here.
38,214
people reacted

Play Your Cards Right: Detecting Wildcard DNS Abuse

  • By Rebekah Houser and Daiping Liu
  • December 1, 2021 at 6:00 AM

20

10 min. read

Observing Attacks Against Hundreds of Exposed Services in Public CloudsA conceptual image representing misconfigurations in the cloud, including insecurely exposed services.
56,567
people reacted

Observing Attacks Against Hundreds of Exposed Services in Public Clouds

  • By Jay Chen
  • November 22, 2021 at 12:00 PM

43

7 min. read

A Peek into Top-Level Domains and CybercrimeA conceptual image related to the domain name system, in this case applied to an analysis of top-level domains and malicious content.
57,473
people reacted

A Peek into Top-Level Domains and Cybercrime

  • By Janos Szurdi
  • November 11, 2021 at 6:00 AM

32

11 min. read

Targeted Attack Campaign Against ManageEngine ADSelfService Plus Delivers Godzilla Webshells, NGLite Trojan and KdcSponge StealerA conceptual image representing cybercrime, such as the use of the NGLite backdoor described here and the KdcSponge credential-stealing tool.
102,438
people reacted

Targeted Attack Campaign Against ManageEngine ADSelfService Plus Delivers Godzilla Webshells, NGLite Trojan and KdcSponge Stealer

  • By Robert Falcone, Jeff White and Peter Renals
  • November 7, 2021 at 6:00 PM

66

18 min. read

Updated: New Evidence Emerges to Suggest WatchDog Was Behind Crypto CampaignA conceptual image representing threats in the cloud, such as TeamTNT, which is expanding its cryptojacking footprint with new TTPs.
76,054
people reacted

Updated: New Evidence Emerges to Suggest WatchDog Was Behind Crypto Campaign

  • By Nathaniel Quist
  • October 29, 2021 at 4:10 PM

20

9 min. read

Network Scanning Traffic Observed in Public CloudsA conceptual image representing network scanning, such as the network scanning traffic researchers observed in public clouds.
45,688
people reacted

Network Scanning Traffic Observed in Public Clouds

  • By Jay Chen
  • October 28, 2021 at 6:00 AM

18

6 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.