Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Category: Threat Prevention

Top CVEs to Patch: Insights from the 2022 Unit 42 Network Threat Trends Research ReportPortion of the cover of the 2022 Unit 42 Network Threat Trends Research Report
57,363
people reacted

Top CVEs to Patch: Insights from the 2022 Unit 42 Network Threat Trends Research Report

  • By Unit 42
  • July 21, 2022 at 6:00 AM

80

4 min. read

There Is More Than One Way to Sleep: Dive Deep Into the Implementations of API Hammering by Various Malware Families
49,469
people reacted

There Is More Than One Way to Sleep: Dive Deep Into the Implementations of API Hammering by Various Malware Families

  • By Mark Lim and Riley Porter
  • June 24, 2022 at 6:00 AM

30

5 min. read

Trending

  • Threat Brief: Attacks on Critical Infrastructure Attributed to Volt Typhoon by Unit 42
  • Cold as Ice: Unit 42 Wireshark Quiz for IcedID by Brad Duncan
  • Old Wine in the New Bottle: Mirai Variant Targets Multiple IoT Devices by Zhibin Zhang
  • Cold as Ice: Answers to Unit 42 Wireshark Quiz for IcedID by Brad Duncan
Network Attack Trends: Attackers Leveraging High Severity and Critical Exploits (May-July 2020)The image illustrates the concept of cybersecurity trends, including network attack trends.
32,622
people reacted

Network Attack Trends: Attackers Leveraging High Severity and Critical Exploits (May-July 2020)

  • By Brock Mammen, Yue Guan and Yu Fu
  • September 15, 2020 at 6:00 AM

28

8 min. read

31,991
people reacted

Palo Alto Networks Researcher Discovers Four Critical Vulnerabilities in Adobe Flash Player

  • By Ryan Olson
  • October 20, 2016 at 1:00 PM

46

< 1 min. read

41,864
people reacted

Palo Alto Networks Discovers Two Adobe Reader Privileged JavaScript Zero-Days

  • By Gal De Leon
  • October 17, 2016 at 5:00 AM

5

8 min. read

Palo Alto Networks Researcher Discovers Eight Critical Vulnerabilities in Adobe Flash Player

  • By Ryan Olson
  • September 19, 2016 at 5:00 AM

5

< 1 min. read

Aveo Malware Family Targets Japanese Speaking Users

  • By Josh Grunzweig and Robert Falcone
  • August 16, 2016 at 11:00 PM

8

5 min. read

Fresh Baked HOMEKit-made Cookles – With a DarkHotel Overlap

  • By Bryan Lee and Robert Falcone
  • August 12, 2016 at 5:00 AM

4

10 min. read

Orcus – Birth of an unusual plugin builder RAT

  • By Vicky Ray
  • August 2, 2016 at 1:00 PM

7

6 min. read

Afraidgate: Major Exploit Kit Campaign Switches from CryptXXX Ransomware Back to Locky

  • By Brad Duncan
  • July 29, 2016 at 10:30 AM

4

4 min. read

SpyNote Android Trojan Builder Leaked

  • By Jacob Soo
  • July 28, 2016 at 1:40 PM

28

4 min. read

Palo Alto Networks Researchers Discover Critical Safari 9.1 Vulnerability

  • By Ryan Olson
  • July 27, 2016 at 5:00 AM

5

< 1 min. read

PowerWare Ransomware Spoofing Locky Malware Family

  • By Tyler Halfpop and Jacob Soo
  • July 21, 2016 at 10:40 AM

10

4 min. read

39,343
people reacted

Technical Walkthrough: Office Test Persistence Method Used In Recent Sofacy Attacks

  • By Robert Falcone
  • July 20, 2016 at 5:00 AM

9

9 min. read

Andromeda Botnet Targets Italy in Recent Spam Campaigns

  • By Josh Grunzweig and Brandon Levene
  • July 18, 2016 at 12:30 PM

8

3 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.