Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Category: Threat Prevention

Top CVEs to Patch: Insights from the 2022 Unit 42 Network Threat Trends Research ReportPortion of the cover of the 2022 Unit 42 Network Threat Trends Research Report
54,371
people reacted

Top CVEs to Patch: Insights from the 2022 Unit 42 Network Threat Trends Research Report

  • By Unit 42
  • July 21, 2022 at 6:00 AM

80

4 min. read

There Is More Than One Way to Sleep: Dive Deep Into the Implementations of API Hammering by Various Malware Families
47,101
people reacted

There Is More Than One Way to Sleep: Dive Deep Into the Implementations of API Hammering by Various Malware Families

  • By Mark Lim and Riley Porter
  • June 24, 2022 at 6:00 AM

30

5 min. read

Trending

  • Answers to Unit 42 Wireshark Quiz, January 2023 by Brad Duncan
  • Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats by Zhibin Zhang
  • Unit 42 Wireshark Quiz, January 2023 by Brad Duncan
  • Chinese PlugX Malware Hidden in Your USB Devices? by Mike Harbison
Network Attack Trends: Attackers Leveraging High Severity and Critical Exploits (May-July 2020)The image illustrates the concept of cybersecurity trends, including network attack trends.
30,958
people reacted

Network Attack Trends: Attackers Leveraging High Severity and Critical Exploits (May-July 2020)

  • By Brock Mammen, Yue Guan and Yu Fu
  • September 15, 2020 at 6:00 AM

28

8 min. read

26,614
people reacted

Palo Alto Networks Researcher Discovers Four Critical Vulnerabilities in Adobe Flash Player

  • By Ryan Olson
  • October 20, 2016 at 1:00 PM

46

< 1 min. read

36,230
people reacted

Palo Alto Networks Discovers Two Adobe Reader Privileged JavaScript Zero-Days

  • By Gal De Leon
  • October 17, 2016 at 5:00 AM

5

8 min. read

Palo Alto Networks Researcher Discovers Eight Critical Vulnerabilities in Adobe Flash Player

  • By Ryan Olson
  • September 19, 2016 at 5:00 AM

5

< 1 min. read

Aveo Malware Family Targets Japanese Speaking Users

  • By Josh Grunzweig and Robert Falcone
  • August 16, 2016 at 11:00 PM

8

5 min. read

Fresh Baked HOMEKit-made Cookles – With a DarkHotel Overlap

  • By Bryan Lee and Robert Falcone
  • August 12, 2016 at 5:00 AM

4

10 min. read

Orcus – Birth of an unusual plugin builder RAT

  • By Vicky Ray
  • August 2, 2016 at 1:00 PM

7

6 min. read

Afraidgate: Major Exploit Kit Campaign Switches from CryptXXX Ransomware Back to Locky

  • By Brad Duncan
  • July 29, 2016 at 10:30 AM

4

4 min. read

SpyNote Android Trojan Builder Leaked

  • By Jacob Soo
  • July 28, 2016 at 1:40 PM

26

4 min. read

Palo Alto Networks Researchers Discover Critical Safari 9.1 Vulnerability

  • By Ryan Olson
  • July 27, 2016 at 5:00 AM

5

< 1 min. read

PowerWare Ransomware Spoofing Locky Malware Family

  • By Tyler Halfpop and Jacob Soo
  • July 21, 2016 at 10:40 AM

10

4 min. read

36,435
people reacted

Technical Walkthrough: Office Test Persistence Method Used In Recent Sofacy Attacks

  • By Robert Falcone
  • July 20, 2016 at 5:00 AM

9

9 min. read

Andromeda Botnet Targets Italy in Recent Spam Campaigns

  • By Josh Grunzweig and Brandon Levene
  • July 18, 2016 at 12:30 PM

8

3 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.