Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts tagged with: cyber crime

Operation Delilah: Unit 42 Helps INTERPOL Identify Nigerian Business Email Compromise ActorA conceptual image representing a cyber adversary, such as the BEC SilverTerrier threat actor recently arrested as part of Operation Delilah.
43,212
people reacted

Operation Delilah: Unit 42 Helps INTERPOL Identify Nigerian Business Email Compromise Actor

  • By Unit 42
  • May 25, 2022 at 6:25 AM

20

5 min. read

Operation Falcon II: Unit 42 Helps INTERPOL Identify Nigerian Business Email Compromise Ring MembersA conceptual image representing an adversary, such as the members of the business email compromise ring SilverTerrier, some of whom were arrested in INTERPOL's recent Operation Falcon II
51,722
people reacted

Operation Falcon II: Unit 42 Helps INTERPOL Identify Nigerian Business Email Compromise Ring Members

  • By Unit 42
  • January 19, 2022 at 8:00 AM

24

9 min. read

Trending

  • Finding Gozi: Answers to Unit 42 Wireshark Quiz, March 2023 by Brad Duncan
  • Threat Brief: 3CXDesktopApp Supply Chain Attack by Robert Falcone
  • Threat Brief - CVE-2023-23397 - Microsoft Outlook Privilege Escalation by Unit 42
A New Web Skimmer Campaign Targets Real Estate Websites Through Attacking Cloud Video Distribution Supply ChainA conceptual image representing malicious code, such as the web skimmer malicious JavaScript code injected into video as described here.
66,557
people reacted

A New Web Skimmer Campaign Targets Real Estate Websites Through Attacking Cloud Video Distribution Supply Chain

  • By Taojie Wang, Jin Chen and Tao Yan
  • January 3, 2022 at 12:00 PM

22

10 min. read

Highlights from the 2021 Unit 42 Ransomware Threat Reportconceptual image illustrating the launch of the 2021 Unit 42 Ransomware Threat Report
62,256
people reacted

Highlights from the 2021 Unit 42 Ransomware Threat Report

  • By Unit 42
  • March 17, 2021 at 3:00 AM

30

3 min. read

Case Study: Emotet Thread Hijacking, an Email Attack TechniqueThis illustration represents the concept of malicious email, such as those involved in Emotet thread hijacking.
72,113
people reacted

Case Study: Emotet Thread Hijacking, an Email Attack Technique

  • By Brad Duncan
  • September 23, 2020 at 6:00 AM

27

5 min. read

Adversaries and Their Motivations (Part 2)

  • By Rob Downs
  • November 12, 2015 at 10:25 AM

6

9 min. read

How Well Do You Understand Your Cyber Adversary? – Part 3

  • By Rick Howard
  • May 21, 2014 at 5:30 AM

5

3 min. read

How Well Do You Understand Your Cyber Adversary? – Part 2

  • By Rick Howard
  • May 20, 2014 at 6:00 AM

6

4 min. read

How Well Do You Understand Your Cyber Adversary? - Part 1

  • By Rick Howard
  • May 19, 2014 at 5:30 AM

6

2 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.