Get to know # Nadav Markus Linux security research manager *** ** * ** *** Blogs by Nadav Markus Sort By: Recent Recent Popular *** ** * ** *** [![CVE-2022-26134 Seen in the Wild by Cortex XDR](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2022/06/In-All-Seriousness.jpg)](https://www2.paloaltonetworks.com/blog/security-operations/cve-2022-26134-seen-in-the-wild-by-cortex-xdr/) ## [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/security-operations/category/use-cases/?ts=markdown) ### [CVE-2022-26134 Seen in the Wild by Cortex XDR](https://www2.paloaltonetworks.com/blog/security-operations/cve-2022-26134-seen-in-the-wild-by-cortex-xdr/) Nowadays, more and more Java vulnerabilities are being discovered. Exploiting these vulnerabilities can devastate a server, often resulting in remote code execution (RCE) and data leaks. And, since most Java vulnerabilities are ... Jun 22, 2022 By [Efi Barkayev](https://www.paloaltonetworks.com/blog/author/efi-barkayev/?ts=markdown "Posts by Efi Barkayev") and [Nadav Markus](https://www.paloaltonetworks.com/blog/author/nadav-markus/?ts=markdown "Posts by Nadav Markus") *** ** * ** *** [![CVE-2021-26084 Linux Exploitation in the Wild](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2021/09/Coding-1.jpg)](https://www2.paloaltonetworks.com/blog/security-operations/cve-2021-26084-linux-exploitation-in-the-wild/) ## [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [News and Events](https://www.paloaltonetworks.com/blog/security-operations/category/news-and-events/?ts=markdown) ### [CVE-2021-26084 Linux Exploitation in the Wild](https://www2.paloaltonetworks.com/blog/security-operations/cve-2021-26084-linux-exploitation-in-the-wild/) Attackers are actively exploiting CVE-2021-26084 Atlassian Confluence vulnerabilities in the wild. Read this blog to view the exact exploit attempts that were detected and blocked by Cortex XDR and learn how many government and educational institutions are exposed to this attack. Sep 24, 2021 By [Nadav Markus](https://www.paloaltonetworks.com/blog/author/nadav-markus/?ts=markdown "Posts by Nadav Markus") and [Abhishek Anbazhagan](https://www.paloaltonetworks.com/blog/author/abhishek-anbazhagan/?ts=markdown "Posts by Abhishek Anbazhagan") *** ** * ** *** [](https://www2.paloaltonetworks.com/blog/2016/05/how-cve-2015-7547-glibc-getaddrinfo-can-bypass-aslr/) ## [Endpoint](https://www.paloaltonetworks.com/blog/category/endpoint-2/?ts=markdown) ### [How CVE-2015-7547 (GLIBC getaddrinfo) Can Bypass ASLR](https://www2.paloaltonetworks.com/blog/2016/05/how-cve-2015-7547-glibc-getaddrinfo-can-bypass-aslr/) Introduction On February 16, 2016 Google described a critical vulnerability in GLIBC's getaddrinfo function. They provided a crash PoC, and so the task of producing a reliable exploit began. In this post, ... May 27, 2016 By [Gal De Leon](https://www.paloaltonetworks.com/blog/author/gal-de-leon/?ts=markdown "Posts by Gal De Leon") and [Nadav Markus](https://www.paloaltonetworks.com/blog/author/nadav-markus/?ts=markdown "Posts by Nadav Markus") *** ** * ** *** [](https://www2.paloaltonetworks.com/blog/2015/01/cve-2014-7911-deep-dive-analysis-android-system-service-vulnerability-exploitation/) ## [Malware](https://www.paloaltonetworks.com/blog/category/malware-2/?ts=markdown), [Mobility](https://www.paloaltonetworks.com/blog/category/mobility/?ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown) ### [CVE-2014-7911 -- A Deep Dive Analysis of Android System Service Vulnerabilit...](https://www2.paloaltonetworks.com/blog/2015/01/cve-2014-7911-deep-dive-analysis-android-system-service-vulnerability-exploitation/) In this post we discuss CVE-2014-7911 and the various techniques that can be used to achieve privilege escalation. We also examine how some of these techniques can be blocked using several security ... Jan 06, 2015 By [Yaron Lavi](https://www.paloaltonetworks.com/blog/author/yaron-lavi/?ts=markdown "Posts by Yaron Lavi") and [Nadav Markus](https://www.paloaltonetworks.com/blog/author/nadav-markus/?ts=markdown "Posts by Nadav Markus") *** ** * ** *** *** ** * ** *** Blogs by Nadav Markus Sort By: Popular Popular Recent *** ** * ** *** [](https://www2.paloaltonetworks.com/blog/2015/01/cve-2014-7911-deep-dive-analysis-android-system-service-vulnerability-exploitation/) ## [Malware](https://www.paloaltonetworks.com/blog/category/malware-2/?ts=markdown), [Mobility](https://www.paloaltonetworks.com/blog/category/mobility/?ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown) ### [CVE-2014-7911 -- A Deep Dive Analysis of Android System Service Vulnerabilit...](https://www2.paloaltonetworks.com/blog/2015/01/cve-2014-7911-deep-dive-analysis-android-system-service-vulnerability-exploitation/) In this post we discuss CVE-2014-7911 and the various techniques that can be used to achieve privilege escalation. We also examine how some of these techniques can be blocked using several security ... Jan 06, 2015 By [Yaron Lavi](https://www.paloaltonetworks.com/blog/author/yaron-lavi/?ts=markdown "Posts by Yaron Lavi") and [Nadav Markus](https://www.paloaltonetworks.com/blog/author/nadav-markus/?ts=markdown "Posts by Nadav Markus") *** ** * ** *** [](https://www2.paloaltonetworks.com/blog/2016/05/how-cve-2015-7547-glibc-getaddrinfo-can-bypass-aslr/) ## [Endpoint](https://www.paloaltonetworks.com/blog/category/endpoint-2/?ts=markdown) ### [How CVE-2015-7547 (GLIBC getaddrinfo) Can Bypass ASLR](https://www2.paloaltonetworks.com/blog/2016/05/how-cve-2015-7547-glibc-getaddrinfo-can-bypass-aslr/) Introduction On February 16, 2016 Google described a critical vulnerability in GLIBC's getaddrinfo function. They provided a crash PoC, and so the task of producing a reliable exploit began. In this post, ... May 27, 2016 By [Gal De Leon](https://www.paloaltonetworks.com/blog/author/gal-de-leon/?ts=markdown "Posts by Gal De Leon") and [Nadav Markus](https://www.paloaltonetworks.com/blog/author/nadav-markus/?ts=markdown "Posts by Nadav Markus") *** ** * ** *** [![CVE-2022-26134 Seen in the Wild by Cortex XDR](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2022/06/In-All-Seriousness.jpg)](https://www2.paloaltonetworks.com/blog/security-operations/cve-2022-26134-seen-in-the-wild-by-cortex-xdr/) ## [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/security-operations/category/use-cases/?ts=markdown) ### [CVE-2022-26134 Seen in the Wild by Cortex XDR](https://www2.paloaltonetworks.com/blog/security-operations/cve-2022-26134-seen-in-the-wild-by-cortex-xdr/) Nowadays, more and more Java vulnerabilities are being discovered. Exploiting these vulnerabilities can devastate a server, often resulting in remote code execution (RCE) and data leaks. And, since most Java vulnerabilities are ... Jun 22, 2022 By [Efi Barkayev](https://www.paloaltonetworks.com/blog/author/efi-barkayev/?ts=markdown "Posts by Efi Barkayev") and [Nadav Markus](https://www.paloaltonetworks.com/blog/author/nadav-markus/?ts=markdown "Posts by Nadav Markus") *** ** * ** *** [![CVE-2021-26084 Linux Exploitation in the Wild](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2021/09/Coding-1.jpg)](https://www2.paloaltonetworks.com/blog/security-operations/cve-2021-26084-linux-exploitation-in-the-wild/) ## [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [News and Events](https://www.paloaltonetworks.com/blog/security-operations/category/news-and-events/?ts=markdown) ### [CVE-2021-26084 Linux Exploitation in the Wild](https://www2.paloaltonetworks.com/blog/security-operations/cve-2021-26084-linux-exploitation-in-the-wild/) Attackers are actively exploiting CVE-2021-26084 Atlassian Confluence vulnerabilities in the wild. Read this blog to view the exact exploit attempts that were detected and blocked by Cortex XDR and learn how many government and educational institutions are exposed to this attack. Sep 24, 2021 By [Nadav Markus](https://www.paloaltonetworks.com/blog/author/nadav-markus/?ts=markdown "Posts by Nadav Markus") and [Abhishek Anbazhagan](https://www.paloaltonetworks.com/blog/author/abhishek-anbazhagan/?ts=markdown "Posts by Abhishek Anbazhagan") *** ** * ** *** {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language