Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts tagged with: network security

Threat Brief: CVE-2022-3786 and CVE-2022-3602: OpenSSL X.509 Buffer OverflowsThreat brief image, covering vulnerabilities such as CVE-2022-3786 and CVE-2022-3602, OpenSSL X.509 Buffer Overflows
58,372
people reacted

Threat Brief: CVE-2022-3786 and CVE-2022-3602: OpenSSL X.509 Buffer Overflows

  • By Shawn Westfall
  • November 2, 2022 at 6:00 PM

18

7 min. read

Trends in Web Threats: Old Web Skimmer Still Active TodayWeb Threat Trends conceptual image
48,386
people reacted

Trends in Web Threats: Old Web Skimmer Still Active Today

  • By Cecilia Hu, Tao Yan, Zhanhao Chen, Jin Chen and Taojie Wang
  • October 21, 2022 at 6:00 AM

9

9 min. read

Trending

  • Threat Brief: Attacks on Critical Infrastructure Attributed to Volt Typhoon by Unit 42
  • Cold as Ice: Unit 42 Wireshark Quiz for IcedID by Brad Duncan
  • Old Wine in the New Bottle: Mirai Variant Targets Multiple IoT Devices by Zhibin Zhang
  • Cold as Ice: Answers to Unit 42 Wireshark Quiz for IcedID by Brad Duncan
Detecting Emerging Network Threats From Newly Observed DomainsDNS security conceptual image, covering topics including malicious newly observed domains
51,713
people reacted

Detecting Emerging Network Threats From Newly Observed Domains

  • By Zhanhao Chen, Daiping Liu, Wanjin Li and Fan Fei
  • October 17, 2022 at 6:00 AM

8

8 min. read

Domain Shadowing: A Stealthy Use of DNS Compromise for CybercrimeDNS security and issues such as domain shadowing are represented by the caution sign within a folder structure. Image includes Palo Alto Networks and Unit 42 logos.
66,628
people reacted

Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime

  • By Janos Szurdi, Rebekah Houser and Daiping Liu
  • September 21, 2022 at 6:00 AM

80

7 min. read

Zero-Day Exploit Detection Using Machine LearningConceptual image representing zero-day exploit detection using machine learning.
57,216
people reacted

Zero-Day Exploit Detection Using Machine Learning

  • By Jin Chen, Lei Xu, Andrew Guan, Zhibin Zhang and Yu Fu
  • September 16, 2022 at 6:00 AM

89

10 min. read

Evasion of Security Policies by VPN Clients Poses Great Risk to Network Operators
48,736
people reacted

Evasion of Security Policies by VPN Clients Poses Great Risk to Network Operators

  • By Stefan Achleitner and Michael Huo
  • June 26, 2019 at 9:45 AM

25

4 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.