Closed himynamesdave closed 1 month ago
Using
http://feeds.feedburner.com/Unit42
job shows all entries skipped. It's not immediately clear why, but its not clear why this would be the case
"id": "cf105dba-cdd0-48b2-a73b-18eb119f8ec7", "info": "", "urls": { "failed": [], "skipped": [ { "id": null, "url": "https://unit42.paloaltonetworks.com/script-based-malware/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/wastedlocker/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/cve-2020-8558/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/valak-evolution/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/oilrig-novel-c2-channel-steganography/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/cve-2020-1350/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/avertx-ip-cameras-vulnerabilities/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/windows-server-containers-vulnerabilities/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/threat-assessment-ekans-ransomware/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/cryptojacking-docker-images-for-mining-monero/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/lucifer-new-cryptojacking-and-ddos-hybrid-malware/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/gps-tracking-and-future-application-for-iot/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/acidbox-rare-malware/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/6-new-d-link-vulnerabilities-found-on-home-routers/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/threat-assessment-hangover-threat-group/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/ironnetinjector/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/watchdog-cryptojacking/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/cve-2021-24074-patch-tuesday/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/bendybear-shellcode-blacktech/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/cve-2020-25213/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/hildegard-malware-teamtnt/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/pro-ocean-rocke-groups-new-cryptojacking-malware/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/network-attack-trends-internet-threats/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/wireshark-tutorial-emotet-infection/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/aws-ebs-direct-apis/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/bumblebee-webshell-xhunt-campaign/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/ta551-shathak-icedid/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/dns-vulnerabilities/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/solarstorm-supply-chain-attack-timeline/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/cve-2020-8554/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/dearcry-ransomware/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/microsoft-exchange-server-attack-timeline/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/remediation-steps-for-the-microsoft-exchange-server-vulnerabilities/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/china-chopper-webshell/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/overview-of-dnsmasq-vulnerabilities-the-dangers-of-dns-cache-poisoning/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/attack-chain-overview-emotet-in-december-2020-and-january-2021/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/microsoft-exchange-server-vulnerabilities/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/cve-2020-17049/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/fast-flux-101/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/ironnetinjector/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/watchdog-cryptojacking/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/cve-2021-24074-patch-tuesday/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/bendybear-shellcode-blacktech/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/cve-2020-25213/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/hildegard-malware-teamtnt/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/matanbuchus-malware-as-a-service/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/prometheus-ransomware/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/teamtnt-cryptojacking-watchdog-operations/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/siloscape/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/teamtnt-operations-cloud-environments/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/docker-honeypot/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/wiped-computer-with-digital-forensics/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/c2-traffic/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/breaking-down-ransomware-attacks/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/bazarloader-malware/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/darkside-ransomware/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/file-transfer-threats/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/proactive-detector/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/westeal/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/unsecured-kubernetes-instances/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/network-security-trends/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/omi-vulnerabilities/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/dangling-domains/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/travel-themed-phishing/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/javascript-based-phishing/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/azure-container-instances/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/cve-2021-26084/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/benign-append-attacks-iupg/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/dns-rebinding/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/cve-2021-32305-websvn/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/phishing-attacks/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/emerging-ransomware-groups/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/person-vpn-network-visibility/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/captcha-protected-phishing/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/ech0raix-ransomware-soho/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/teamtnt-cryptojacking-watchdog-operations/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/cloud-network-scanning-traffic/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/bazarloader-network-reconnaissance/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/exploits-interactsh/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/silverterrier-nigerian-business-email-compromise/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/wireshark-workshop-videos/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/credential-harvesting/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/cloud-threat-report-2h-2021/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/network-security-trends/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/omi-vulnerabilities/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/dangling-domains/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/travel-themed-phishing/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/javascript-based-phishing/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/azure-container-instances/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/cve-2021-26084/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/cobalt-strike-metadata-encoding-decoding/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/bazarloader-anti-analysis-techniques/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/blackbyte-ransomware/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/aws-log4shell-hot-patch-vulnerabilities/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/visibility-k8s-clusters/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/iam-cloud-threat-research/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/web-threats-malicious-host-urls/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/solarmarker-malware/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/cve-2022-22965-springshell/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/lapsus-group/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/2022-ransomware-threat-report-highlights/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/iot-supply-chain-cve-2021-28372/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/cobalt-strike-malleable-c2-profile/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/gke-autopilot-vulnerabilities/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/cve-2022-0492-cgroups/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/lazagne-leverages-d-bus/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/wireshark-quiz-redline-stealer/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/sugarcrm-cloud-incident-black-hat/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/nodestealer-2-targets-facebook-business/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/threat-brief-cve-2023-35078/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/threat-brief-citrix-cve-2023-3519/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/url-delivered-ransomware/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/mallox-ransomware/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/peer-to-peer-worm-p2pinfect/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/cve-2023-36884-rce/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/cloaked-ursa-phishing/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/malicious-packages-in-pypi/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/manic-menagerie-targets-web-hosting-and-it/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/cobalt-strike-malleable-c2/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/mirai-variant-targets-iot-exploits/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/operation-diplomatic-specter/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/payloads-in-malicious-onenote-samples/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/three-dns-tunneling-campaigns/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/cve-2024-3400/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/muddled-libra-evolution-to-cloud/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/malware-initiated-scanning-attacks/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/threat-brief-xz-utils-cve-2024-3094/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/new-bola-vulnerability-grafana/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/chinese-apts-target-asean-entities/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/strelastealer-campaign/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/curious-serpens-falsefont-backdoor/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/unit-42-scpc-ssscip-uncover-smoke-loader-phishing/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/analysis-of-bunnyloader-malware/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/muddled-libra/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/using-wireshark-exporting-objects-from-a-pcap/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/apk-badpack-malware-tampered-headers/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/darkgate-malware-uses-excel-files/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/javascript-malware-gootloader/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/threat-brief-cve-2024-6387-openssh/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/contrastive-credibility-propagation/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/attackers-exploit-public-cobalt-strike-profiles/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/cloud-virtual-machine-attack-vectors/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/operation-diplomatic-specter/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/payloads-in-malicious-onenote-samples/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/three-dns-tunneling-campaigns/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/cve-2024-3400/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/muddled-libra-evolution-to-cloud/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/malware-initiated-scanning-attacks/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/threat-brief-xz-utils-cve-2024-3094/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/new-bola-vulnerability-grafana/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/global-protect-vpn-spoof-distributes-wikiloader/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/tracking-newly-released-top-level-domains/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/dynamics-of-deepfake-scams/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/shinyhunters-ransomware-extortion/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/profiling-detecting-malicious-dns-traffic/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/large-scale-cloud-extortion-operation/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/2024-unit-42-attack-surface-threat-research-internet-connected-exposures/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/github-repo-artifacts-leak-tokens/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/automated-bola-detection-and-ai/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/unit-42-ransomware-leak-site-data-analysis/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/fighting-ursa-car-for-sale-phishing-lure/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/bola-vulnerability-impacts-container-registry-harbor/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/cybersquatting-using-genai-keywords/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/bola-vulnerabilities-easyappointments/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/accelerating-malware-analysis/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/threat-assessment-north-korean-threat-groups-2024/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/stately-taurus-abuses-vscode-southeast-asian-espionage/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/global-protect-vpn-spoof-distributes-wikiloader/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/tracking-newly-released-top-level-domains/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/dynamics-of-deepfake-scams/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/shinyhunters-ransomware-extortion/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/profiling-detecting-malicious-dns-traffic/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/large-scale-cloud-extortion-operation/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/2024-unit-42-attack-surface-threat-research-internet-connected-exposures/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/github-repo-artifacts-leak-tokens/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/automated-bola-detection-and-ai/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/unit-42-ransomware-leak-site-data-analysis/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/fighting-ursa-car-for-sale-phishing-lure/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/bola-vulnerability-impacts-container-registry-harbor/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/cybersquatting-using-genai-keywords/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/repellent-scorpius-cicada3301-ransomware/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/threat-assessment-north-korean-threat-groups-2024/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/stately-taurus-abuses-vscode-southeast-asian-espionage/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/global-protect-vpn-spoof-distributes-wikiloader/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/tracking-newly-released-top-level-domains/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/dynamics-of-deepfake-scams/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/shinyhunters-ransomware-extortion/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/profiling-detecting-malicious-dns-traffic/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/large-scale-cloud-extortion-operation/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/2024-unit-42-attack-surface-threat-research-internet-connected-exposures/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/github-repo-artifacts-leak-tokens/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/automated-bola-detection-and-ai/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/unit-42-ransomware-leak-site-data-analysis/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/fighting-ursa-car-for-sale-phishing-lure/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/bola-vulnerability-impacts-container-registry-harbor/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/detecting-dns-tunneling-campaigns/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/machine-learning-new-swiss-army-suite-tool/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/kimsuky-new-keylogger-backdoor-variant/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/phishing-platform-sniper-dz-unique-tactics/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/snipbot-romcom-malware-variant/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/analysis-pentest-tool-splinter/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/gleaming-pisces-applejeus-poolrat-and-pondrat/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/rare-phishing-page-delivery-header-refresh/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/repellent-scorpius-cicada3301-ransomware/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/threat-assessment-north-korean-threat-groups-2024/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/stately-taurus-abuses-vscode-southeast-asian-espionage/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/global-protect-vpn-spoof-distributes-wikiloader/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/tracking-newly-released-top-level-domains/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/dynamics-of-deepfake-scams/" }, { "id": null, "url": "https://unit42.paloaltonetworks.com/shinyhunters-ransomware-extortion/" } ], "retrieved": [], "retrieving": [] }, "state": "success", "feed_id": "b4e3f13c-0ad6-5abe-be01-2475d341bf84", "profile_id": "7e73c0b7-3ee1-54cf-86a7-8eaccd9392a2", "run_datetime": "2024-10-08T05:45:10.019501Z", "count_of_items": 210, "latest_item_requested": "2024-10-08T05:45:10.019160Z", "earliest_item_requested": "2020-01-01T00:00:00Z"
it's very clear, you have include_remote_blogs set
include_remote_blogs
i'm an idiot, sorry!
Using
http://feeds.feedburner.com/Unit42
job shows all entries skipped. It's not immediately clear why, but its not clear why this would be the case