Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?
A pictorial representation of the threat actor group Playful Taurus showing an illustration of an orange bull’s head against the background of a blue night sky. Included is the constellation of Taurus.
16,297
people reacted

Chinese Playful Taurus Activity in Iran

Chinese APT Playful Taurus is using a new backdoor named Turian. Analysis suggests several Iranian government networks have likely been compromised.
Read Blog

22

9 min. read

A conceptual image representing malware, including PlugX
1,616
people reacted

Chinese PlugX Malware Hidden in Your USB Devices?

PlugX remains an active threat. A newly discovered variant infects USB devices and a similar variant makes copies of PDF and Microsoft Word files.
Read Blog

5

12 min. read

Cloud Threats: Original Research and In-Depth Analysis

Cloud Threats: Original Research and In-Depth Analysis

Learn more
Don't Panic!: The Unit 42 Podcast

Don't Panic!: The Unit 42 Podcast

Listen

Get updates from Unit 42

Please enter your email address!

loader

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Please mark, I'm not a robot!

  • All
  • Threat Briefs
  • Threat Assessments
  • Reports
  • All
  • Threat Briefs
  • Threat Assessments
  • Reports
Chinese PlugX Malware Hidden in Your USB Devices?A conceptual image representing malware, including PlugX
1,616
people reacted

Chinese PlugX Malware Hidden in Your USB Devices?

  • By Mike Harbison and Jen Miller-Osborn
  • January 26, 2023 at 6:00 AM

5

12 min. read

Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain ThreatsA pictorial representation of network attack trends such as CVE-2021-35394 featuring a stylized bug on IoT-related products. The Palo Alto Networks and Unit 42 logos are included.
7,066
people reacted

Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats

  • By Yiheng An, Chao Lei, Adam Robbie, Aveek Das, Zhibin Zhang and Shehroze Farooqi
  • January 24, 2023 at 6:00 AM

19

8 min. read

Trending

  • Answers to Unit 42 Wireshark Quiz, January 2023 by Brad Duncan
  • Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats by Zhibin Zhang
  • Unit 42 Wireshark Quiz, January 2023 by Brad Duncan
  • Chinese PlugX Malware Hidden in Your USB Devices? by Mike Harbison
Answers to Unit 42 Wireshark Quiz, January 2023The text Wireshark Quiz in orange set across a screenshot of the Wireshark program.
3,608
people reacted

Answers to Unit 42 Wireshark Quiz, January 2023

  • By Brad Duncan
  • January 23, 2023 at 6:00 AM

2

6 min. read

Unit 42 Wireshark Quiz, January 2023The text Wireshark Quiz in orange set across a screenshot of the Wireshark program.
8,757
people reacted

Unit 42 Wireshark Quiz, January 2023

  • By Brad Duncan
  • January 20, 2023 at 6:00 AM

7

4 min. read

Network Security Trends: August-October 2022A pictorial representation of a security vulnerability. It shows a checkmark on a shield within a crystal ball.
12,254
people reacted

Network Security Trends: August-October 2022

  • By Yiheng An
  • January 12, 2023 at 6:00 AM

12

11 min. read

Disclosing a New Vulnerability in JWT Secret Poisoning (CVE-2022-23529)A pictorial representation of the JsonWebToken vulnerability.
75,267
people reacted

Disclosing a New Vulnerability in JWT Secret Poisoning (CVE-2022-23529)

  • By Artur Oleyarsh
  • January 9, 2023 at 6:00 AM

48

7 min. read

PurpleUrchin Bypasses CAPTCHA and Steals Cloud Platform ResourcesA pictorial representation of PurpleUrchin and cryptomining. Included are the Palo Alto Networks and Unit 42 logos.
24,002
people reacted

PurpleUrchin Bypasses CAPTCHA and Steals Cloud Platform Resources

  • By William Gamazo and Nathaniel Quist
  • January 5, 2023 at 6:00 AM

8

10 min. read

Navigating the Vast Ocean of Sandbox EvasionsA pictorial depiction of a sandbox evasion
26,845
people reacted

Navigating the Vast Ocean of Sandbox Evasions

  • By Esmid Idrizovic, Bob Jung, Daniel Raygoza and Sean Hughes
  • December 27, 2022 at 6:00 AM

8

13 min. read

Threat Brief: OWASSRF Vulnerability ExploitationA pictorial representation of the ProxyNotShell bypass threat brief
35,722
people reacted

Threat Brief: OWASSRF Vulnerability Exploitation

  • By Robert Falcone and Lior Rochberger
  • December 22, 2022 at 5:30 PM

11

9 min. read

Meddler-in-the-Middle Phishing Attacks ExplainedA pictorial representation of a meddler-in-the-middle phishing attack
33,488
people reacted

Meddler-in-the-Middle Phishing Attacks Explained

  • By Lucas Hu, Howard Tong, Suiqiang Deng and Alex Starov
  • December 21, 2022 at 6:00 AM

10

10 min. read

Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of UkraineA pictorial representation of Trident Ursa showing a purple bear and trident
49,207
people reacted

Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine

  • By Unit 42
  • December 20, 2022 at 3:00 AM

31

15 min. read

Digging Inside Azure Functions: HyperV Is the Last Line of DefenseA pictorial representation of many storage containers stacked together
34,132
people reacted

Digging Inside Azure Functions: HyperV Is the Last Line of Defense

  • By Daniel Prizmant and Aviv Sasson
  • December 15, 2022 at 6:00 AM

8

10 min. read

Precious Gemstones: The New Generation of Kerberos AttacksAn illustrative example of Kerberos attacks using golden, diamond, or sapphire tickets
44,509
people reacted

Precious Gemstones: The New Generation of Kerberos Attacks

  • By Oz Soprin and Shachar Roitman
  • December 12, 2022 at 6:00 AM

21

14 min. read

Compromised Cloud Compute Credentials: Case Studies From the WildA pictorial representation of a cloud breach
44,455
people reacted

Compromised Cloud Compute Credentials: Case Studies From the Wild

  • By Dror Alon
  • December 8, 2022 at 3:00 PM

36

9 min. read

Vice Society: Profiling a Persistent Threat to the Education SectorImage showing illustrative example of ransomware like Vice Society with a hand offering money to a second hand holding a key with a computer screen showing a virus image on it
53,042
people reacted

Vice Society: Profiling a Persistent Threat to the Education Sector

  • By JR Gumarin
  • December 6, 2022 at 3:00 AM

9

13 min. read

loader gif
Sorry, no results were found.
Sorry, no results were found.
Clear

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.