As part of Unit 42’s efforts to proactively monitor threats circulating in the wild, I recently came across new Hoaxcalls and Mirai botnet campaigns targeting a post-authentication Remote Code Execution vulnerability in Symantec Secure Web Gateway 5.0.2.8, which is a product...
First discovered in 2016, TrickBot is an information stealer that provides backdoor access sometimes used by criminal groups to distribute other malware. TrickBot uses modules to perform different functions, and one key function is propagating from an infected Windows client to a...
On February 28, 2020, Palo Alto Networks’ Unit 42 researchers discovered six new vulnerabilities in D-Link wireless cloud routers running their latest firmware. The vulnerabilities were found in the DIR-865L model of D-Link routers, which is meant for home network use....
Unit 42 researchers recently published on activity by the Hangover threat group (aka Neon, Viceroy Tiger, MONSOON) carrying out targeted cyberattacks deploying BackConfig malware attacks against government and military organizations in South Asia. As a result, we’ve created this threat assessment report for...
As cloud computing evolves, containers continue to become more and more popular. New solutions and ideas to the way we implement containers are being introduced. One of these new ideas is rootless containers. Rootless containers is a new concept of containers...
Unit 42 has observed activity over the last 4 months involving the BackConfig malware used by the Hangover threat group (aka Neon, Viceroy Tiger, MONSOON). Targets of the spear-phishing attacks, using local and topical lures, included government and military organizations in South Asia....
The simplest and fastest way to begin with IoT development is by using one of many available IoT platforms. Creating new and differentiated mobile services today is extremely challenging since it requires deep and elaborate integration into the cell network. A...
Brief Article Teaches You the Ins and Outs of Apple’s Cloud and What You Should Do Today When you click share, it’s going bring in a link you are able to send. So Android’s foreseeable future is cloudy but for the...
Move Data in the Cloud Fundamentals Explained There are a number of ways the cloud is able to make your life simpler. Then you may determine what exactly does and doesn’t belong in the cloud step-by-step. Cloud and hybrid Organizations have...
A Startling Fact about Microsoft Cloud Computing Technology Uncovered Cloud refers to a collection of scalable services a user can access via an online connection, preferably one with a greater bandwidth and very low latency. The cloud is also self-managed by...