Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts created by: Micah Yates

New Emotet Infection MethodA conceptual image representing phishing, such as the research on a new Emotet infection method covered here.
56,811
people reacted

New Emotet Infection Method

  • By Saqib Khanzada, Tyler Halfpop, Micah Yates and Brad Duncan
  • February 15, 2022 at 6:00 AM

23

5 min. read

40,410
people reacted

Operation Blockbuster Goes Mobile

  • By Anthony Kasza, Juan Cortes and Micah Yates
  • November 20, 2017 at 2:45 PM

19

7 min. read

Trending

  • Machine Learning Versus Memory Resident Evil by Esmid Idrizovic
45,427
people reacted

The Blockbuster Sequel

  • By Anthony Kasza and Micah Yates
  • April 7, 2017 at 5:00 AM

4

8 min. read

54,228
people reacted

Confucius Says...Malware Families Get Further By Abusing Legitimate Websites

  • By Tom Lancaster and Micah Yates
  • September 28, 2016 at 10:10 AM

9

9 min. read

The Dukes R&D Finds a New Anti-Analysis Technique

  • By Robert Falcone and Micah Yates
  • September 9, 2016 at 8:53 AM

8

4 min. read

Operation Ke3chang Resurfaces With New TidePool Malware

  • By Micah Yates, Mike Scott, Brandon Levene, Jen Miller-Osborn and Tom Keigher
  • May 22, 2016 at 6:00 PM

29

6 min. read

New Poison Ivy RAT Variant Targets Hong Kong Pro-Democracy Activists

  • By Micah Yates, Mike Scott, Brandon Levene and Jen Miller-Osborn
  • April 21, 2016 at 7:45 PM

13

6 min. read

Ransomware: Locky, TeslaCrypt, Other Malware Families Use New Tool To Evade Detection

  • By Jeff White, Chris Astacio and Micah Yates
  • April 8, 2016 at 9:50 AM

11

5 min. read

Locky: New Ransomware Mimics Dridex-Style Distribution

  • By Brandon Levene, Micah Yates and Rob Downs
  • February 16, 2016 at 4:20 PM

8

4 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.