Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts tagged with: privacy

CNAME Cloaking: Disguising Third Parties Through the DNSDNS security conceptual image, covering concepts including CNAME cloaking
50,966
people reacted

CNAME Cloaking: Disguising Third Parties Through the DNS

  • By Rebekah Houser and Daiping Liu
  • October 24, 2022 at 6:00 AM

6

10 min. read

Tor 101: How Tor Works and its Risks to the EnterpriseConceptual image representing global traffic and information flow. Tor sometimes plays a role in efforts to conceal network traffic, both benign and malicious.
60,845
people reacted

Tor 101: How Tor Works and its Risks to the Enterprise

  • By Janos Szurdi
  • August 29, 2022 at 6:00 AM

59

14 min. read

Trending

  • Malicious JavaScript Injection Campaign Infects 51k Websites by Brody Kutt
  • Finding Gozi: Unit 42 Wireshark Quiz, March 2023 by Brad Duncan
  • Finding Gozi: Answers to Unit 42 Wireshark Quiz, March 2023 by Brad Duncan
Android Apps Leaking Sensitive Data Found on Google Play With 6 Million U.S. DownloadsData leakage from mobile applications, as illustrated here, can make users trackable and open them to malicious attacks. The image shows a mobile device screen and icons representing attackers hovering around the device monitoring for leakage.
47,044
people reacted

Android Apps Leaking Sensitive Data Found on Google Play With 6 Million U.S. Downloads

  • By Stefan Achleitner and Chengcheng Xu
  • November 24, 2020 at 3:00 AM

33

8 min. read

35,010
people reacted

Threat Brief: Twelve Tips for the Holidays

  • By Unit 42
  • December 13, 2018 at 6:00 AM

5

6 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.