Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Category: Threat Briefs and Assessments

Threat Group Assessment: Turla (aka Pensive Ursa)A pictorial representation of an APT such as Turla or Pensive Ursa.
3,369
people reacted

Threat Group Assessment: Turla (aka Pensive Ursa)

  • By Unit 42
  • September 15, 2023 at 6:00 AM

13

14 min. read

Threat Group Assessment: Muddled Libra (Updated)Pictorial representation of a threat actor like Muddled Libra
27,760
people reacted

Threat Group Assessment: Muddled Libra (Updated)

  • By Kristopher Russo, Austin Dever and Amer Elsad
  • September 15, 2023 at 6:00 AM

14

11 min. read

Trending

  • Threat Group Assessment: Muddled Libra (Updated) by Unit 42
  • Unit 42 Attack Surface Threat Research: Constant Change in Cloud Contributes to 45% of New High/Critical Exposures Per Month by Unit 42
  • Wireshark Tutorial: Display Filter Expressions by Brad Duncan
  • Wireshark Tutorial: Changing Your Column Display by Brad Duncan
  • Threat Group Assessment: Turla (aka Pensive Ursa) by Unit 42
Threat Brief: Multiple Vulnerabilities Including Zero-Day Remote Unauthenticated API Access – CVE-2023-35078 – in Ivanti Endpoint Manager Mobile (Updated)A pictorial representation of a vulnerability such as CVE-2023-35078
5,580
people reacted

Threat Brief: Multiple Vulnerabilities Including Zero-Day Remote Unauthenticated API Access – CVE-2023-35078 – in Ivanti Endpoint Manager Mobile (Updated)

  • By Unit 42
  • July 28, 2023 at 5:42 PM

13

8 min. read

Threat Brief: RCE Vulnerability CVE-2023-3519 on Customer-Managed Citrix ServersA pictorial representation of a vulnerability such as CVE-2023-3519 affecting Citrix NetScaler.
6,185
people reacted

Threat Brief: RCE Vulnerability CVE-2023-3519 on Customer-Managed Citrix Servers

  • By Unit 42
  • July 28, 2023 at 4:00 PM

3

5 min. read

Threat Group Assessment: Mallox RansomwareA pictorial representation of the Mallox ransomware gang. A hand offers money to another hand holding keys. In the background is a computer screen with the biohazard symbol on it.
8,359
people reacted

Threat Group Assessment: Mallox Ransomware

  • By Lior Rochberger and Shimi Cohen
  • July 20, 2023 at 10:15 AM

18

10 min. read

CVE-2023-36884 - Microsoft Office and Windows HTML Remote Code Execution: Threat Brief (Updated)Standard image for Unit 42 Threat Brief format, in this case covering CVE-2023-36884, Microsoft Office and Windows HTML Remote Code Execution
22,092
people reacted

CVE-2023-36884 - Microsoft Office and Windows HTML Remote Code Execution: Threat Brief (Updated)

  • By Unit 42
  • July 12, 2023 at 11:45 AM

29

4 min. read

Threat Brief - MOVEit Transfer SQL Injection Vulnerabilities: CVE-2023-34362, CVE-2023-35036 and CVE-2023-35708 (Updated July 7)A pictorial representation of a vulnerability like CVE-2023-34362
45,515
people reacted

Threat Brief - MOVEit Transfer SQL Injection Vulnerabilities: CVE-2023-34362, CVE-2023-35036 and CVE-2023-35708 (Updated July 7)

  • By Unit 42
  • June 6, 2023 at 2:30 PM

35

7 min. read

Threat Brief: Attacks on Critical Infrastructure Attributed to Insidious Taurus (aka Volt Typhoon)A pictorial representation of threat actor Volt Typhoon
50,072
people reacted

Threat Brief: Attacks on Critical Infrastructure Attributed to Insidious Taurus (aka Volt Typhoon)

  • By Unit 42
  • May 26, 2023 at 2:30 PM

15

7 min. read

Threat Assessment: Royal RansomwareA pictorial representation of ransomware like Royal Ransomware. It shows an exchange of money for keys in front of a laptop screen.
74,842
people reacted

Threat Assessment: Royal Ransomware

  • By Doel Santos, Daniel Bunce and Anthony Galiette
  • May 9, 2023 at 6:00 AM

9

11 min. read

Threat Brief - CVE-2023-23397 - Microsoft Outlook Privilege EscalationA pictorial representation of an email vulnerability like CVE-2023-23397
83,126
people reacted

Threat Brief - CVE-2023-23397 - Microsoft Outlook Privilege Escalation

  • By Unit 42
  • March 31, 2023 at 12:06 AM

18

5 min. read

Threat Brief: 3CXDesktopApp Supply Chain Attack (Updated)A pictorial representation of a supply chain attack like that against 3CXDesktopApp
78,944
people reacted

Threat Brief: 3CXDesktopApp Supply Chain Attack (Updated)

  • By Robert Falcone and Josh Grunzweig
  • March 30, 2023 at 12:50 PM

29

8 min. read

Bee-Ware of Trigona, An Emerging Ransomware StrainA pictorial representation of ransomware like Trigona. It shows an exchange of money for keys in front of a laptop screen.
69,666
people reacted

Bee-Ware of Trigona, An Emerging Ransomware Strain

  • By Frank Lee and Scott Roland
  • March 16, 2023 at 6:00 AM

26

18 min. read

Threat Brief: OWASSRF Vulnerability ExploitationA pictorial representation of the ProxyNotShell bypass threat brief
64,435
people reacted

Threat Brief: OWASSRF Vulnerability Exploitation

  • By Robert Falcone and Lior Rochberger
  • December 22, 2022 at 5:30 PM

14

9 min. read

Precious Gemstones: The New Generation of Kerberos AttacksAn illustrative example of Kerberos attacks using golden, diamond, or sapphire tickets
58,204
people reacted

Precious Gemstones: The New Generation of Kerberos Attacks

  • By Oz Soprin and Shachar Roitman
  • December 12, 2022 at 6:00 AM

27

14 min. read

Threat Assessment: Luna Moth Callback Phishing CampaignCybercrime conceptual image, covering activity such as the Luna Moth callback phishing campaign
73,087
people reacted

Threat Assessment: Luna Moth Callback Phishing Campaign

  • By Kristopher Russo
  • November 21, 2022 at 3:00 AM

20

8 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.