• Tools
  • ATOMs
  • About Us

Posts created by: John Harrison

The image illustrates the concept of vulnerabilities, including the 27 new vulnerabilities across Microsoft products discovered by Unit 42 researchers.
17,119
people reacted

Unit 42 Discovers 27 New Vulnerabilities Across Microsoft Products

  • By John Harrison
  • October 2, 2020 at 3:00 PM

6

3 min. read

27,533
people reacted

Exploits in the Wild for Citrix ADC and Citrix Gateway Directory Traversal Vulnerability CVE-2019-19781

  • By Yue Guan, Qi Deng, Zhibin Zhang, Siddhart Shibiraj, Zhanhao Chen, Cecilia Hu and John Harrison
  • January 16, 2020 at 6:00 AM

26

4 min. read

Trending

  • COVID-19: Cloud Threat Landscape
  • SilverTerrier: New COVID-19 Themed Business Email Compromise Schemes
  • Updated BackConfig Malware Targeting Government and Military Organizations in South Asia
  • Threat Brief: Maze Ransomware Activities
  • COVID-19 Themed Malware Within Cloud Environments
20,518
people reacted

Unit 42 Discovers 13 New Vulnerabilities Across Microsoft and Adobe Products

  • By John Harrison
  • December 19, 2019 at 6:00 AM

6

2 min. read

13,050
people reacted

Unit 42 Presents New Research at BlueHat Seattle on Three New Windows RDP Vulnerability Exploit Methods

  • By John Harrison
  • December 12, 2019 at 2:45 PM

12

2 min. read

35,117
people reacted

Unit 42 Named Top Zero-Day Vulnerability Contributor by Microsoft

  • By John Harrison
  • September 4, 2019 at 11:35 AM

21

2 min. read

33,890
people reacted

Unit 42 Discovers 10 New Microsoft Vulnerabilities

  • By John Harrison
  • June 20, 2019 at 10:02 AM

3

2 min. read

22,587
people reacted

Unit 42 Discovers Vulnerabilities in Adobe Acrobat and Reader and Foxit Reader, Shares Threat Research at Microsoft BlueHat Shanghai 2019

  • By John Harrison
  • May 31, 2019 at 11:37 AM

2

3 min. read

Unit 42 Vulnerability Research Team Discovers 23 New Vulnerabilities February 2019 Disclosures – Adobe and Microsoft

  • By John Harrison
  • February 22, 2019 at 12:00 PM

2

2 min. read

15,514
people reacted

Detecting Malicious Campaigns with Machine Learning

  • By Michael Weber, Jiangtao Yin, Jun Javier Wang, Yuchen Zhou, Wei Xu and John Harrison
  • October 12, 2018 at 12:00 PM

3

7 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2021 Palo Alto Networks, Inc. All rights reserved.