Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Category: Threat Advisory/Analysis

When Pentest Tools Go Brutal: Red-Teaming Tool Being Abused by Malicious ActorsA conceptual image illustrating the concept of an adversary, underscoring the ethical discussion around red-teaming tools such as Brute Ratel
118,570
people reacted

When Pentest Tools Go Brutal: Red-Teaming Tool Being Abused by Malicious Actors

  • By Mike Harbison and Peter Renals
  • July 5, 2022 at 6:00 AM

69

15 min. read

Russia-Ukraine Cyberattacks (Updated): How to Protect Against Related Cyberthreats Including DDoS, HermeticWiper, Gamaredon, Website Defacement, Phishing and ScamsA conceptual image representing geopolitical cyber activity, such as what has been associated with Russia-Ukraine
117,729
people reacted

Russia-Ukraine Cyberattacks (Updated): How to Protect Against Related Cyberthreats Including DDoS, HermeticWiper, Gamaredon, Website Defacement, Phishing and Scams

  • By Unit 42
  • February 22, 2022 at 3:00 PM

324

13 min. read

Trending

  • Finding Gozi: Answers to Unit 42 Wireshark Quiz, March 2023 by Brad Duncan
  • Threat Brief: 3CXDesktopApp Supply Chain Attack by Robert Falcone
Ransomware Families: 2021 Data to Supplement the Unit 42 Ransomware Threat ReportA conceptual image representing ransomware, such as the ransomware families discussed in this post.
43,471
people reacted

Ransomware Families: 2021 Data to Supplement the Unit 42 Ransomware Threat Report

  • By Guang Qing He, Cecil Liu, Aiden Huang and Royce Lu
  • July 28, 2021 at 6:00 AM

55

7 min. read

Conti Ransomware Gang: An OverviewThe Conti ransomware gang gets an overview.
65,993
people reacted

Conti Ransomware Gang: An Overview

  • By Richard Hickman
  • June 18, 2021 at 6:00 AM

36

5 min. read

27,431
people reacted

Inside TDrop2: Technical Analysis of new Dark Seoul Malware

  • By Josh Grunzweig
  • November 23, 2015 at 5:00 PM

14

10 min. read

Updated PClock Ransomware Still Comes Up Short

  • By Josh Grunzweig
  • September 29, 2015 at 12:00 PM

13

6 min. read

Unit 42 Identifies New DragonOK Backdoor Malware Deployed Against Japanese Targets

  • By Jen Miller-Osborn and Josh Grunzweig
  • April 14, 2015 at 1:31 PM

19

8 min. read

Android Installer Hijacking Vulnerability Could Expose Android Users to Malware

  • By Zhi Xu
  • March 24, 2015 at 5:00 AM

10

7 min. read

Filmkan: Mysterious Turkish Botnet Grows Through Facebook

  • By Ryan Olson
  • February 5, 2015 at 9:05 AM

10

8 min. read

Analysis: CryptoWall 3.0, Dyre and I2P

  • By Ryan Olson
  • February 1, 2015 at 8:00 PM

11

3 min. read

Newest CTB-Locker Campaign Bypasses Legacy Security Products

  • By Tomer Bar
  • January 28, 2015 at 12:45 PM

2

3 min. read

Tracking New Ransomware CryptoWall 2.0

  • By Ryan Olson
  • October 22, 2014 at 4:50 PM

10

4 min. read

Stolen Email Accounts of World’s Top Universities Selling on China’s Largest C2C Platform

  • By Claud Xiao and Rob Downs
  • September 4, 2014 at 1:00 PM

14

6 min. read

Bad Certificate Management in Google Play Store

  • By Zhi Xu and Jen Miller-Osborn
  • August 28, 2014 at 2:00 PM

8

6 min. read

Examining the CHS Breach and Heartbleed Exploitation

  • By Ryan Olson
  • August 20, 2014 at 1:50 PM

18

2 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.