Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts tagged with: Cloud-Delivered Security Services

Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain ThreatsA pictorial representation of network attack trends such as CVE-2021-35394 featuring a stylized bug on IoT-related products. The Palo Alto Networks and Unit 42 logos are included.
18,726
people reacted

Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats

  • By Yiheng An, Chao Lei, Adam Robbie, Aveek Das, Zhibin Zhang and Shehroze Farooqi
  • January 24, 2023 at 6:00 AM

28

8 min. read

Answers to Unit 42 Wireshark Quiz, January 2023The text Wireshark Quiz in orange set across a screenshot of the Wireshark program.
9,835
people reacted

Answers to Unit 42 Wireshark Quiz, January 2023

  • By Brad Duncan
  • January 23, 2023 at 6:00 AM

4

6 min. read

Trending

  • Machine Learning Versus Memory Resident Evil by Esmid Idrizovic
Unit 42 Wireshark Quiz, January 2023The text Wireshark Quiz in orange set across a screenshot of the Wireshark program.
15,345
people reacted

Unit 42 Wireshark Quiz, January 2023

  • By Brad Duncan
  • January 20, 2023 at 6:00 AM

9

4 min. read

Network Security Trends: August-October 2022A pictorial representation of a security vulnerability. It shows a checkmark on a shield within a crystal ball.
17,856
people reacted

Network Security Trends: August-October 2022

  • By Yiheng An
  • January 12, 2023 at 6:00 AM

13

11 min. read

Threat Brief: OWASSRF Vulnerability ExploitationA pictorial representation of the ProxyNotShell bypass threat brief
41,396
people reacted

Threat Brief: OWASSRF Vulnerability Exploitation

  • By Robert Falcone and Lior Rochberger
  • December 22, 2022 at 5:30 PM

11

9 min. read

Blowing Cobalt Strike Out of the Water With Memory AnalysisConceptual image representing evasive malware such as Cobalt Strike
53,650
people reacted

Blowing Cobalt Strike Out of the Water With Memory Analysis

  • By Dominik Reichel, Esmid Idrizovic and Bob Jung
  • December 2, 2022 at 6:00 AM

18

15 min. read

Typhon Reborn With New CapabilitiesMalware conceptual image, covering variants such as Typhon Reborn
54,252
people reacted

Typhon Reborn With New Capabilities

  • By Riley Porter and Uday Pratap Singh
  • November 14, 2022 at 6:00 AM

7

7 min. read

Threat Brief: CVE-2022-3786 and CVE-2022-3602: OpenSSL X.509 Buffer OverflowsThreat brief image, covering vulnerabilities such as CVE-2022-3786 and CVE-2022-3602, OpenSSL X.509 Buffer Overflows
56,493
people reacted

Threat Brief: CVE-2022-3786 and CVE-2022-3602: OpenSSL X.509 Buffer Overflows

  • By Shawn Westfall
  • November 2, 2022 at 6:00 PM

18

7 min. read

Defeating Guloader Anti-Analysis TechniqueMalware conceptual image, including types of malware such as the Guloader variant covered here.
52,615
people reacted

Defeating Guloader Anti-Analysis Technique

  • By Mark Lim
  • October 28, 2022 at 6:00 AM

8

5 min. read

Trends in Web Threats in CY Q2 2022: Malicious JavaScript Downloaders Are EvolvingTrends conceptual image, covering web threat trends such as the evolution of a malicious JavaScript downloader.
49,250
people reacted

Trends in Web Threats in CY Q2 2022: Malicious JavaScript Downloaders Are Evolving

  • By Cecilia Hu, Tao Yan, Jin Chen and Taojie Wang
  • October 26, 2022 at 6:00 AM

8

8 min. read

CNAME Cloaking: Disguising Third Parties Through the DNSDNS security conceptual image, covering concepts including CNAME cloaking
49,357
people reacted

CNAME Cloaking: Disguising Third Parties Through the DNS

  • By Rebekah Houser and Daiping Liu
  • October 24, 2022 at 6:00 AM

5

10 min. read

Detecting Emerging Network Threats From Newly Observed DomainsDNS security conceptual image, covering topics including malicious newly observed domains
49,556
people reacted

Detecting Emerging Network Threats From Newly Observed Domains

  • By Zhanhao Chen, Daiping Liu, Wanjin Li and Fan Fei
  • October 17, 2022 at 6:00 AM

7

8 min. read

Ransom Cartel Ransomware: A Possible Connection With REvilRansomware conceptual image, covering threat actors such as Ransom Cartel
66,571
people reacted

Ransom Cartel Ransomware: A Possible Connection With REvil

  • By Amer Elsad and Daniel Bunce
  • October 14, 2022 at 6:00 AM

21

17 min. read

Threat Brief: CVE-2022-41040 and CVE-2022-41082: Microsoft Exchange Server (ProxyNotShell)Threat Brief Image for CVE-2022-41040, CVE-2022-41082, ProxyNotShell
73,716
people reacted

Threat Brief: CVE-2022-41040 and CVE-2022-41082: Microsoft Exchange Server (ProxyNotShell)

  • By Shawn Westfall
  • October 4, 2022 at 4:30 PM

108

8 min. read

Domain Shadowing: A Stealthy Use of DNS Compromise for CybercrimeDNS security and issues such as domain shadowing are represented by the caution sign within a folder structure. Image includes Palo Alto Networks and Unit 42 logos.
63,182
people reacted

Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime

  • By Janos Szurdi, Rebekah Houser and Daiping Liu
  • September 21, 2022 at 6:00 AM

80

7 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.