Cyberveilleby Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
12 résultats taggé paloaltonetworks  ✕
CVE-2023-34362: MOVEit Transfer SQL Injection Vulnerability Threat Brief https://unit42.paloaltonetworks.com/threat-brief-moveit-cve-2023-34362/
07/06/2023 20:25:16
QRCode
archive.org
thumbnail

On May 31, Progress Software posted a notification alerting customers of a critical Structured Query Language injection (SQLi) vulnerability (CVE-2023-34362) in their MOVEit Transfer product. MOVEit Transfer is a managed file transfer (MFT) application intended to provide secure collaboration and automated file transfers of sensitive data.

paloaltonetworks EN 2023 MOVEit SQL Injection Vulnerability CVE-2023-34362
Old Wine in the New Bottle: Mirai Variant Targets Multiple IoT Devices https://unit42.paloaltonetworks.com/mirai-variant-iz1h9/
27/05/2023 21:48:42
QRCode
archive.org
thumbnail

We analyze Mirai variant IZ1H9, which targets IoT devices. Our overview includes campaigns observed, botnet configuration and vulnerabilities exploited.

paloaltonetworks EN 2023 Mirai IZ1H9 IoT campaigns
GoBruteforcer: Golang-Based Botnet Actively Harvests Web Servers https://unit42.paloaltonetworks.com/gobruteforcer-golang-botnet/
13/03/2023 20:01:14
QRCode
archive.org
thumbnail

New Golang-based malware we have dubbed GoBruteforcer targets web servers. Golang is becoming popular with malware programmers due to its versatility.

unit42 EN 2023 Golang paloaltonetworks Botnet GoBruteforcer web servers
Vice Society: Profiling a Persistent Threat to the Education Sector https://unit42.paloaltonetworks.com/vice-society-targets-education-sector/
06/12/2022 19:52:15
QRCode
archive.org
thumbnail

Vice Society, a ransomware gang, has been involved in high-profile activity against schools this year.

unit42 EN 2022 paloaltonetworks vice-society education ransomware schools
Blowing Cobalt Strike Out of the Water With Memory Analysis https://unit42.paloaltonetworks.com/cobalt-strike-memory-analysis/
06/12/2022 06:51:47
QRCode
archive.org
thumbnail

Unit 42 researchers examine several malware samples that incorporate Cobalt Strike components, and discuss some of the ways that we catch these samples by analyzing artifacts from the deltas in process memory at key points of execution. We will also discuss the evasion tactics used by these threats, and other issues that make their analysis problematic.

unit42 EN 2022 CobaltStrike analysis paloaltonetworks
Banking Trojan Techniques: Financially Motivated Malware https://unit42.paloaltonetworks.com/banking-trojan-techniques/
01/11/2022 20:47:57
QRCode
archive.org

Understanding banking Trojan techniques can help detect other activities of financially motivated threat groups.

unit42 EN 2022 paloaltonetworks research Banking Trojan Techniques
Ransom Cartel Ransomware: A Possible Connection With REvil https://unit42.paloaltonetworks.com/ransom-cartel-ransomware/
18/10/2022 10:33:34
QRCode
archive.org
thumbnail

Ransom Cartel is ransomware as a service (RaaS) that exhibits several similarities to and technical overlaps with REvil ransomware. Read our overview.

unit42 paloaltonetworks EN 2022 Ransom-Cartel REvil RaaS
Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime https://unit42.paloaltonetworks.com/domain-shadowing/
22/09/2022 15:39:32
QRCode
archive.org
thumbnail

Domain shadowing is a special case of DNS hijacking where attackers stealthily create malicious subdomains under compromised domain names.

paloaltonetworks EN 2022 DNS hijacking Domain shadowing analysis IoCs Domain-shadowing
Mirai Variant MooBot Targeting D-Link Devices https://unit42.paloaltonetworks.com/moobot-d-link-devices/
07/09/2022 11:09:36
QRCode
archive.org
thumbnail

Attackers are leveraging known vulnerabilities in D-Link devices to deliver MooBot, a Mirai variant, potentially leading to further DDoS attacks.

unit42 paloaltonetworks EN 2022 Mirai Variant MooBot Targeting D-Link CVE-2015-2051 CVE-2018-6530 CVE-2022-26258 CVE-2022-28958 analysis
Legitimate SaaS Platforms Being Used to Host Phishing Attacks https://unit42.paloaltonetworks.com/platform-abuse-phishing/
24/08/2022 15:56:47
QRCode
archive.org
thumbnail

Platform-abuse phishing is on the rise. We analyze how attackers use services such as website builders to host phishing pages.

unit42 paloaltonetworks EN 2022 phishing attack SaaS abuse website-builders
Palo Alto bug used for DDoS attacks and there's no fix yet https://www.theregister.com/2022/08/12/palo_alto_bug/
13/08/2022 10:46:28
QRCode
archive.org
thumbnail

A high-severity Palo Alto Networks denial-of-service (DoS) vulnerability has been exploited by miscreants looking to launch DDoS attacks, and several of the affected products won't have a patch until next week

theregister EN 2022 paloaltonetworks bug DDoS CVE-2022-0028
New Emotet Infection Method https://unit42.paloaltonetworks.com/new-emotet-infection-method/
16/02/2022 19:57:47
QRCode
archive.org
thumbnail

As early as Dec. 21, 2021, Unit 42 observed a new infection method for the highly prevalent malware family Emotet. Emotet is high-volume malware that often changes and modifies its attack patterns. This latest modification of the Emotet attack follows suit.

paloaltonetworks emotet 2022 EN IoC malware
1765 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn - Curated by Decio