Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts tagged with: WildFire

Chinese PlugX Malware Hidden in Your USB Devices?A conceptual image representing malware, including PlugX
2,383
people reacted

Chinese PlugX Malware Hidden in Your USB Devices?

  • By Mike Harbison and Jen Miller-Osborn
  • January 26, 2023 at 6:00 AM

5

12 min. read

Answers to Unit 42 Wireshark Quiz, January 2023The text Wireshark Quiz in orange set across a screenshot of the Wireshark program.
3,838
people reacted

Answers to Unit 42 Wireshark Quiz, January 2023

  • By Brad Duncan
  • January 23, 2023 at 6:00 AM

2

6 min. read

Trending

  • Answers to Unit 42 Wireshark Quiz, January 2023 by Brad Duncan
  • Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats by Zhibin Zhang
  • Unit 42 Wireshark Quiz, January 2023 by Brad Duncan
  • Chinese PlugX Malware Hidden in Your USB Devices? by Mike Harbison
Unit 42 Wireshark Quiz, January 2023The text Wireshark Quiz in orange set across a screenshot of the Wireshark program.
9,051
people reacted

Unit 42 Wireshark Quiz, January 2023

  • By Brad Duncan
  • January 20, 2023 at 6:00 AM

7

4 min. read

Chinese Playful Taurus Activity in IranA pictorial representation of the threat actor group Playful Taurus showing an illustration of an orange bull’s head against the background of a blue night sky. Included is the constellation of Taurus.
16,594
people reacted

Chinese Playful Taurus Activity in Iran

  • By Unit 42
  • January 18, 2023 at 3:00 AM

22

9 min. read

Network Security Trends: August-October 2022A pictorial representation of a security vulnerability. It shows a checkmark on a shield within a crystal ball.
12,461
people reacted

Network Security Trends: August-October 2022

  • By Yiheng An
  • January 12, 2023 at 6:00 AM

12

11 min. read

Navigating the Vast Ocean of Sandbox EvasionsA pictorial depiction of a sandbox evasion
27,055
people reacted

Navigating the Vast Ocean of Sandbox Evasions

  • By Esmid Idrizovic, Bob Jung, Daniel Raygoza and Sean Hughes
  • December 27, 2022 at 6:00 AM

8

13 min. read

Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of UkraineA pictorial representation of Trident Ursa showing a purple bear and trident
49,438
people reacted

Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine

  • By Unit 42
  • December 20, 2022 at 3:00 AM

31

15 min. read

Vice Society: Profiling a Persistent Threat to the Education SectorImage showing illustrative example of ransomware like Vice Society with a hand offering money to a second hand holding a key with a computer screen showing a virus image on it
53,263
people reacted

Vice Society: Profiling a Persistent Threat to the Education Sector

  • By JR Gumarin
  • December 6, 2022 at 3:00 AM

9

13 min. read

Blowing Cobalt Strike Out of the Water With Memory AnalysisConceptual image representing evasive malware such as Cobalt Strike
52,551
people reacted

Blowing Cobalt Strike Out of the Water With Memory Analysis

  • By Dominik Reichel, Esmid Idrizovic and Bob Jung
  • December 2, 2022 at 6:00 AM

18

15 min. read

An AI Based Solution to Detecting the DoubleZero .NET WiperConceptual image representing malware detection, including the machine learning model that can analyze the DoubleZero .NET wiper.
52,019
people reacted

An AI Based Solution to Detecting the DoubleZero .NET Wiper

  • By Akshata Rao, Zong-Yu Wu and Wenjun Hu
  • November 18, 2022 at 6:00 PM

8

7 min. read

Typhon Reborn With New CapabilitiesMalware conceptual image, covering variants such as Typhon Reborn
53,853
people reacted

Typhon Reborn With New Capabilities

  • By Riley Porter and Uday Pratap Singh
  • November 14, 2022 at 6:00 AM

7

7 min. read

Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the WildMalware conceptual image, covering topics such as Cobalt Strike Team Server, which can be abused by malware authors for malicious purposes
64,984
people reacted

Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild

  • By Durgesh Sangvikar, Chris Navarrete, Matthew Tennis, Yanhui Jia, Yu Fu and Siddhart Shibiraj
  • November 3, 2022 at 6:00 AM

22

9 min. read

Banking Trojan Techniques: How Financially Motivated Malware Became InfrastructureBanking Trojan techniques conceptual image
59,653
people reacted

Banking Trojan Techniques: How Financially Motivated Malware Became Infrastructure

  • By Or Chechik
  • October 31, 2022 at 6:00 AM

12

10 min. read

Defeating Guloader Anti-Analysis TechniqueMalware conceptual image, including types of malware such as the Guloader variant covered here.
52,396
people reacted

Defeating Guloader Anti-Analysis Technique

  • By Mark Lim
  • October 28, 2022 at 6:00 AM

8

5 min. read

Detecting Emerging Network Threats From Newly Observed DomainsDNS security conceptual image, covering topics including malicious newly observed domains
49,415
people reacted

Detecting Emerging Network Threats From Newly Observed Domains

  • By Zhanhao Chen, Daiping Liu, Wanjin Li and Fan Fei
  • October 17, 2022 at 6:00 AM

7

8 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.