Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts created by: Mike Scott

Extending AutoFocus Threat Intelligence With New Tag Types

  • By Mike Scott
  • June 17, 2016 at 4:05 PM

6

6 min. read

New Wekby Attacks Use DNS Requests As Command and Control Mechanism

  • By Josh Grunzweig, Mike Scott and Bryan Lee
  • May 24, 2016 at 11:30 AM

11

6 min. read

Trending

  • Answers to Unit 42 Wireshark Quiz, January 2023 by Brad Duncan
  • Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats by Zhibin Zhang
  • Unit 42 Wireshark Quiz, January 2023 by Brad Duncan
  • Chinese PlugX Malware Hidden in Your USB Devices? by Mike Harbison

Operation Ke3chang Resurfaces With New TidePool Malware

  • By Micah Yates, Mike Scott, Brandon Levene, Jen Miller-Osborn and Tom Keigher
  • May 22, 2016 at 6:00 PM

29

6 min. read

New Poison Ivy RAT Variant Targets Hong Kong Pro-Democracy Activists

  • By Micah Yates, Mike Scott, Brandon Levene and Jen Miller-Osborn
  • April 21, 2016 at 7:45 PM

13

6 min. read

Attack Campaign on the Government of Thailand Delivers Bookworm Trojan

  • By Robert Falcone, Mike Scott and Juan Cortes
  • November 24, 2015 at 5:01 PM

5

12 min. read

Bookworm Trojan: A Model of Modular Architecture

  • By Robert Falcone, Mike Scott and Juan Cortes
  • November 10, 2015 at 11:00 AM

5

10 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.