Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts tagged with: Cybercrime

Detecting Emerging Network Threats From Newly Observed DomainsDNS security conceptual image, covering topics including malicious newly observed domains
49,415
people reacted

Detecting Emerging Network Threats From Newly Observed Domains

  • By Zhanhao Chen, Daiping Liu, Wanjin Li and Fan Fei
  • October 17, 2022 at 6:00 AM

7

8 min. read

Domain Shadowing: A Stealthy Use of DNS Compromise for CybercrimeDNS security and issues such as domain shadowing are represented by the caution sign within a folder structure. Image includes Palo Alto Networks and Unit 42 logos.
62,967
people reacted

Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime

  • By Janos Szurdi, Rebekah Houser and Daiping Liu
  • September 21, 2022 at 6:00 AM

80

7 min. read

Trending

  • Answers to Unit 42 Wireshark Quiz, January 2023 by Brad Duncan
  • Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats by Zhibin Zhang
  • Unit 42 Wireshark Quiz, January 2023 by Brad Duncan
  • Chinese PlugX Malware Hidden in Your USB Devices? by Mike Harbison
Threat Assessment: BlackByte RansomwareA conceptual image representing ransomware, including the BlackByte ransomware discussed here.
41,910
people reacted

Threat Assessment: BlackByte Ransomware

  • By Amer Elsad
  • April 21, 2022 at 12:00 PM

25

10 min. read

Threat Assessment: BlackCat RansomwareA conceptual image representing ransomware, such as the BlackCat ransomware discussed here.
75,882
people reacted

Threat Assessment: BlackCat Ransomware

  • By Amanda Tanner, Alex Hinchliffe and Doel Santos
  • January 27, 2022 at 6:00 AM

60

10 min. read

A Peek into Top-Level Domains and CybercrimeA conceptual image related to the domain name system, in this case applied to an analysis of top-level domains and malicious content.
57,473
people reacted

A Peek into Top-Level Domains and Cybercrime

  • By Janos Szurdi
  • November 11, 2021 at 6:00 AM

32

11 min. read

Attackers Are Taking Advantage of the Open-Source Service Interactsh for Malicious PurposesA conceptual image representing alerts on vulnerabilities and exploits, such as the monitoring that revealed exploit attempts that traced to malicious use of the Interactsh tool.
66,547
people reacted

Attackers Are Taking Advantage of the Open-Source Service Interactsh for Malicious Purposes

  • By Yue Guan, Jin Chen, Leo Olson, Wayne Xin and Daiping Liu
  • October 14, 2021 at 6:00 AM

46

7 min. read

SilverTerrier – Nigerian Business Email CompromiseAn image representing an adversary, such as the threat actors discussed in this overview of SilverTerrier, the name we use to track Nigerian business email compromise.
50,300
people reacted

SilverTerrier – Nigerian Business Email Compromise

  • By Peter Renals
  • October 7, 2021 at 6:00 AM

15

19 min. read

Credential Harvesting at Scale Without MalwareA conceptual image representing malicious email, such as that used for credential harvesting as part of scams such as business email compromise.
47,131
people reacted

Credential Harvesting at Scale Without Malware

  • By Brady Stout
  • September 30, 2021 at 3:00 PM

67

8 min. read

Network Security Trends: May-July 2021A conceptual image representing trends, such as those covered in our post on network security trends from May-July 2021.
45,748
people reacted

Network Security Trends: May-July 2021

  • By Yue Guan and Lei Xu
  • September 17, 2021 at 3:00 PM

13

9 min. read

Phishing Eager TravelersA conceptual image representing the COVID-19 pandemic and cybercrime – this blog discusses how threat actors are poised to take advantage of one of the aspects of the slowing spread of the virus: attacking a renewed travel industry with travel-themed phishing campaigns.
47,467
people reacted

Phishing Eager Travelers

  • By Anna Chung and Swetha Balla
  • September 15, 2021 at 6:00 AM

31

9 min. read

PhishingJS: A Deep Learning Model for JavaScript-Based Phishing DetectionA conceptual image representing phishing, such as the JavaScript-based phishing discussed here.
38,634
people reacted

PhishingJS: A Deep Learning Model for JavaScript-Based Phishing Detection

  • By Lucas Hu
  • September 10, 2021 at 6:00 AM

24

7 min. read

Ransomware Groups to Watch: Emerging ThreatsA conceptual image representing ransomware, including the emerging ransomware groups covered here: AvosLocker, Hive, HelloKitty and LockBit 2.0.
64,731
people reacted

Ransomware Groups to Watch: Emerging Threats

  • By Doel Santos and Ruchna Nigam
  • August 24, 2021 at 3:00 AM

65

11 min. read

Personal VPN and Its Evasions: Risk Factors and How to Maintain Network VisibilityPersonal VPN and Its Evasions: Risk Factors and How to Maintain Network Visibility
31,669
people reacted

Personal VPN and Its Evasions: Risk Factors and How to Maintain Network Visibility

  • By Saeed Abbasi and Kirti Parekh
  • August 16, 2021 at 6:00 PM

44

7 min. read

Discovering CAPTCHA Protected Phishing CampaignsA conceptual image representing phishing, as discussed in this post. Here, we cover CAPTCHA-protected phishing campaigns and how they can be detected and mitigated.
36,795
people reacted

Discovering CAPTCHA Protected Phishing Campaigns

  • By Shresta Bellary Seetharam, Billy Melicher and Oleksii Starov
  • August 13, 2021 at 12:00 PM

45

8 min. read

Using AI to Detect Malicious C2 TrafficMachine Learning Command and Control project detects C2 traffic types.
41,110
people reacted

Using AI to Detect Malicious C2 Traffic

  • By Ajaya Neupane and Stefan Achleitner
  • May 24, 2021 at 6:00 AM

27

8 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.