THREAT

Detect and Prevent Threats

 

Command-and-control attacks can compromise an entire network. Find out what they are and how they work.

3 min read

DNS tunneling is one of the most damaging DNS-based attacks. What exactly is it, and how does it work?

3 min read

DNS hijacking has been used to take over the web domain of The New York Times. What is it, and how does it work?

3 min read

Fileless malware and “living off the land” have been around for some time, but have seen a resurgence in recent months. What’s behind this growing popularity? Jen Miller Osborn, Deputy Director of Threat Intelligence of Unit 42 explains what makes these tactics so attractive to malicious actors.

3 min read

For many, the cryptocurrency phenomenon is intriguing but complicated, involving “blockchain,” “distributed ledgers” and other jargon. Ryan Olson, VP of Threat Intelligence Unit 42, explains one of the hidden threats of the cryptocurrency boom — cryptomining attacks.

3 min read

Attackers always look for quick ways to steal data. Using readily available automated tools and advanced techniques, they can do so with ease, leaving your traditional network defenses ineffective.

3 min read