• Tools
  • ATOMs
  • About Us

Category: Threat Prevention

The image illustrates the concept of cybersecurity trends, including network attack trends.
20,639
people reacted

Network Attack Trends: Attackers Leveraging High Severity and Critical Exploits

  • By Brock Mammen, Yue Guan and Yu Fu
  • September 15, 2020 at 6:00 AM

18

8 min. read

16,640
people reacted

Palo Alto Networks Researcher Discovers Four Critical Vulnerabilities in Adobe Flash Player

  • By Ryan Olson
  • October 20, 2016 at 1:00 PM

1

< 1 min. read

Trending

  • COVID-19: Cloud Threat Landscape
  • SilverTerrier: New COVID-19 Themed Business Email Compromise Schemes
  • Updated BackConfig Malware Targeting Government and Military Organizations in South Asia
  • Threat Brief: Maze Ransomware Activities
  • COVID-19 Themed Malware Within Cloud Environments
23,970
people reacted

Palo Alto Networks Discovers Two Adobe Reader Privileged JavaScript Zero-Days

  • By Gal De Leon
  • October 17, 2016 at 5:00 AM

1

8 min. read

Palo Alto Networks Researcher Discovers Eight Critical Vulnerabilities in Adobe Flash Player

  • By Ryan Olson
  • September 19, 2016 at 5:00 AM

1

< 1 min. read

Aveo Malware Family Targets Japanese Speaking Users

  • By Josh Grunzweig and Robert Falcone
  • August 16, 2016 at 11:00 PM

0

5 min. read

Fresh Baked HOMEKit-made Cookles – With a DarkHotel Overlap

  • By Bryan Lee and Robert Falcone
  • August 12, 2016 at 5:00 AM

0

10 min. read

Orcus – Birth of an unusual plugin builder RAT

  • By Vicky Ray
  • August 2, 2016 at 1:00 PM

1

6 min. read

Afraidgate: Major Exploit Kit Campaign Switches from CryptXXX Ransomware Back to Locky

  • By Brad Duncan
  • July 29, 2016 at 10:30 AM

0

4 min. read

SpyNote Android Trojan Builder Leaked

  • By Jacob Soo
  • July 28, 2016 at 1:40 PM

8

4 min. read

Palo Alto Networks Researchers Discover Critical Safari 9.1 Vulnerability

  • By Ryan Olson
  • July 27, 2016 at 5:00 AM

1

< 1 min. read

PowerWare Ransomware Spoofing Locky Malware Family

  • By Tyler Halfpop and Jacob Soo
  • July 21, 2016 at 10:40 AM

0

4 min. read

20,633
people reacted

Technical Walkthrough: Office Test Persistence Method Used In Recent Sofacy Attacks

  • By Robert Falcone
  • July 20, 2016 at 5:00 AM

0

9 min. read

Andromeda Botnet Targets Italy in Recent Spam Campaigns

  • By Josh Grunzweig and Brandon Levene
  • July 18, 2016 at 12:30 PM

0

3 min. read

Palo Alto Networks Researchers Discover Two Critical Internet Explorer Vulnerabilities

  • By Ryan Olson
  • July 13, 2016 at 1:15 PM

0

< 1 min. read

How to Track Actors Behind Keyloggers Using Embedded Credentials

  • By Jeff White
  • July 12, 2016 at 3:00 PM

0

8 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2021 Palo Alto Networks, Inc. All rights reserved.