Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts tagged with: NGFW

Vice Society: Profiling a Persistent Threat to the Education SectorImage showing illustrative example of ransomware like Vice Society with a hand offering money to a second hand holding a key with a computer screen showing a virus image on it
70,845
people reacted

Vice Society: Profiling a Persistent Threat to the Education Sector

  • By JR Gumarin
  • December 6, 2022 at 3:00 AM

31

13 min. read

Ransomware Families: 2021 Data to Supplement the Unit 42 Ransomware Threat ReportA conceptual image representing ransomware, such as the ransomware families discussed in this post.
45,720
people reacted

Ransomware Families: 2021 Data to Supplement the Unit 42 Ransomware Threat Report

  • By Guang Qing He, Cecil Liu, Aiden Huang and Royce Lu
  • July 28, 2021 at 6:00 AM

56

7 min. read

Trending

  • Threat Group Assessment: Muddled Libra (Updated) by Unit 42
  • Unit 42 Attack Surface Threat Research: Constant Change in Cloud Contributes to 45% of New High/Critical Exposures Per Month by Unit 42
  • Wireshark Tutorial: Display Filter Expressions by Brad Duncan
  • Fake CVE-2023-40477 Proof of Concept Leads to VenomRAT by Robert Falcone
  • Unit 42 Researchers Discover Multiple Espionage Operations Targeting Southeast Asian Government by Robert Falcone
THOR: Previously Unseen PlugX Variant Deployed During Microsoft Exchange Server Attacks by PKPLUG GroupA conceptual image representing THOR, a previously unseen PlugX variant deployed by the PKPLUG Group. The image features a Panda because PKPLUG is also known as Mustang Panda. It also features the logos of Palo Alto Networks and Unit 42.
86,739
people reacted

THOR: Previously Unseen PlugX Variant Deployed During Microsoft Exchange Server Attacks by PKPLUG Group

  • By Mike Harbison and Alex Hinchliffe
  • July 27, 2021 at 12:00 PM

55

13 min. read

Using AI to Detect Malicious C2 TrafficMachine Learning Command and Control project detects C2 traffic types.
48,294
people reacted

Using AI to Detect Malicious C2 Traffic

  • By Ajaya Neupane and Stefan Achleitner
  • May 24, 2021 at 6:00 AM

29

8 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.