Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts tagged with: Cortex

Vice Society: Profiling a Persistent Threat to the Education SectorImage showing illustrative example of ransomware like Vice Society with a hand offering money to a second hand holding a key with a computer screen showing a virus image on it
55,549
people reacted

Vice Society: Profiling a Persistent Threat to the Education Sector

  • By JR Gumarin
  • December 6, 2022 at 3:00 AM

10

13 min. read

Threat Assessment: Luna Moth Callback Phishing CampaignCybercrime conceptual image, covering activity such as the Luna Moth callback phishing campaign
65,508
people reacted

Threat Assessment: Luna Moth Callback Phishing Campaign

  • By Kristopher Russo
  • November 21, 2022 at 3:00 AM

16

8 min. read

Trending

  • Machine Learning Versus Memory Resident Evil by Esmid Idrizovic
An AI Based Solution to Detecting the DoubleZero .NET WiperConceptual image representing malware detection, including the machine learning model that can analyze the DoubleZero .NET wiper.
52,521
people reacted

An AI Based Solution to Detecting the DoubleZero .NET Wiper

  • By Akshata Rao, Zong-Yu Wu and Wenjun Hu
  • November 18, 2022 at 6:00 PM

8

7 min. read

Typhon Reborn With New CapabilitiesMalware conceptual image, covering variants such as Typhon Reborn
54,215
people reacted

Typhon Reborn With New Capabilities

  • By Riley Porter and Uday Pratap Singh
  • November 14, 2022 at 6:00 AM

7

7 min. read

Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the WildMalware conceptual image, covering topics such as Cobalt Strike Team Server, which can be abused by malware authors for malicious purposes
65,386
people reacted

Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild

  • By Durgesh Sangvikar, Chris Navarrete, Matthew Tennis, Yanhui Jia, Yu Fu and Siddhart Shibiraj
  • November 3, 2022 at 6:00 AM

22

9 min. read

Threat Brief: CVE-2022-3786 and CVE-2022-3602: OpenSSL X.509 Buffer OverflowsThreat brief image, covering vulnerabilities such as CVE-2022-3786 and CVE-2022-3602, OpenSSL X.509 Buffer Overflows
56,467
people reacted

Threat Brief: CVE-2022-3786 and CVE-2022-3602: OpenSSL X.509 Buffer Overflows

  • By Shawn Westfall
  • November 2, 2022 at 6:00 PM

18

7 min. read

Banking Trojan Techniques: How Financially Motivated Malware Became InfrastructureBanking Trojan techniques conceptual image
60,079
people reacted

Banking Trojan Techniques: How Financially Motivated Malware Became Infrastructure

  • By Or Chechik
  • October 31, 2022 at 6:00 AM

12

10 min. read

Defeating Guloader Anti-Analysis TechniqueMalware conceptual image, including types of malware such as the Guloader variant covered here.
52,589
people reacted

Defeating Guloader Anti-Analysis Technique

  • By Mark Lim
  • October 28, 2022 at 6:00 AM

8

5 min. read

Ransom Cartel Ransomware: A Possible Connection With REvilRansomware conceptual image, covering threat actors such as Ransom Cartel
66,534
people reacted

Ransom Cartel Ransomware: A Possible Connection With REvil

  • By Amer Elsad and Daniel Bunce
  • October 14, 2022 at 6:00 AM

21

17 min. read

Threat Brief: CVE-2022-41040 and CVE-2022-41082: Microsoft Exchange Server (ProxyNotShell)Threat Brief Image for CVE-2022-41040, CVE-2022-41082, ProxyNotShell
73,683
people reacted

Threat Brief: CVE-2022-41040 and CVE-2022-41082: Microsoft Exchange Server (ProxyNotShell)

  • By Shawn Westfall
  • October 4, 2022 at 4:30 PM

108

8 min. read

More Than Meets the Eye: Exposing a Polyglot File That Delivers IcedIDConceptual image representing malware, such as the information stealer IcedID, being delivered by a polyglot file.
58,779
people reacted

More Than Meets the Eye: Exposing a Polyglot File That Delivers IcedID

  • By Mark Lim
  • September 27, 2022 at 6:00 AM

70

4 min. read

Hunting for Unsigned DLLs to Find APTsConceptual image representing adversaries and advanced persistent threats. Here, we discuss a method for finding these groups by hunting for unsigned DLLs.
70,078
people reacted

Hunting for Unsigned DLLs to Find APTs

  • By Daniela Shalev and Itay Gamliel
  • September 26, 2022 at 6:00 AM

135

7 min. read

Domain Shadowing: A Stealthy Use of DNS Compromise for CybercrimeDNS security and issues such as domain shadowing are represented by the caution sign within a folder structure. Image includes Palo Alto Networks and Unit 42 logos.
63,154
people reacted

Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime

  • By Janos Szurdi, Rebekah Houser and Daiping Liu
  • September 21, 2022 at 6:00 AM

80

7 min. read

OriginLogger: A Look at Agent Tesla’s SuccessorA conceptual image representing malware such as OriginLogger
63,419
people reacted

OriginLogger: A Look at Agent Tesla’s Successor

  • By Jeff White
  • September 13, 2022 at 6:00 AM

48

14 min. read

Credential Gathering From Third-Party SoftwareCredential gathering techniques discussed here can open the door to cybercriminals as depicted in this conceptual image.
55,079
people reacted

Credential Gathering From Third-Party Software

  • By Dor Attar
  • September 8, 2022 at 12:00 PM

57

14 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.