Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts tagged with: threat intelligence

Threat Assessment: Luna Moth Callback Phishing CampaignCybercrime conceptual image, covering activity such as the Luna Moth callback phishing campaign
68,384
people reacted

Threat Assessment: Luna Moth Callback Phishing Campaign

  • By Kristopher Russo
  • November 21, 2022 at 3:00 AM

18

8 min. read

Detecting Emerging Network Threats From Newly Observed DomainsDNS security conceptual image, covering topics including malicious newly observed domains
50,707
people reacted

Detecting Emerging Network Threats From Newly Observed Domains

  • By Zhanhao Chen, Daiping Liu, Wanjin Li and Fan Fei
  • October 17, 2022 at 6:00 AM

8

8 min. read

Trending

  • Malicious JavaScript Injection Campaign Infects 51k Websites by Brody Kutt
  • Finding Gozi: Unit 42 Wireshark Quiz, March 2023 by Brad Duncan
  • Finding Gozi: Answers to Unit 42 Wireshark Quiz, March 2023 by Brad Duncan
Ransom Cartel Ransomware: A Possible Connection With REvilRansomware conceptual image, covering threat actors such as Ransom Cartel
68,663
people reacted

Ransom Cartel Ransomware: A Possible Connection With REvil

  • By Amer Elsad and Daniel Bunce
  • October 14, 2022 at 6:00 AM

21

17 min. read

Threat Brief: CVE-2022-41040 and CVE-2022-41082: Microsoft Exchange Server (ProxyNotShell)Threat Brief Image for CVE-2022-41040, CVE-2022-41082, ProxyNotShell
75,870
people reacted

Threat Brief: CVE-2022-41040 and CVE-2022-41082: Microsoft Exchange Server (ProxyNotShell)

  • By Shawn Westfall
  • October 4, 2022 at 4:30 PM

109

8 min. read

Hunting for Unsigned DLLs to Find APTsConceptual image representing adversaries and advanced persistent threats. Here, we discuss a method for finding these groups by hunting for unsigned DLLs.
72,282
people reacted

Hunting for Unsigned DLLs to Find APTs

  • By Daniela Shalev and Itay Gamliel
  • September 26, 2022 at 6:00 AM

136

7 min. read

Domain Shadowing: A Stealthy Use of DNS Compromise for CybercrimeDNS security and issues such as domain shadowing are represented by the caution sign within a folder structure. Image includes Palo Alto Networks and Unit 42 logos.
64,844
people reacted

Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime

  • By Janos Szurdi, Rebekah Houser and Daiping Liu
  • September 21, 2022 at 6:00 AM

80

7 min. read

OriginLogger: A Look at Agent Tesla’s SuccessorA conceptual image representing malware such as OriginLogger
66,320
people reacted

OriginLogger: A Look at Agent Tesla’s Successor

  • By Jeff White
  • September 13, 2022 at 6:00 AM

48

14 min. read

Credential Gathering From Third-Party SoftwareCredential gathering techniques discussed here can open the door to cybercriminals as depicted in this conceptual image.
56,071
people reacted

Credential Gathering From Third-Party Software

  • By Dor Attar
  • September 8, 2022 at 12:00 PM

57

14 min. read

BlueSky Ransomware: Fast Encryption via MultithreadingRansomware conceptual image, covering groups including BlueSky Ransomware
82,161
people reacted

BlueSky Ransomware: Fast Encryption via Multithreading

  • By Muhammad Umer Khan, Lee Wei, Yang Ji and Wenjun Hu
  • August 10, 2022 at 12:00 PM

1140

7 min. read

Novel News on Cuba Ransomware: Greetings From Tropical ScorpiusRansomware conceptual image, covering groups such as Cuba Ransomware aka Tropical Scorpius
84,402
people reacted

Novel News on Cuba Ransomware: Greetings From Tropical Scorpius

  • By Anthony Galiette, Daniel Bunce, Doel Santos and Shawn Westfall
  • August 9, 2022 at 9:00 AM

79

20 min. read

Unit 42 Threat Group Naming UpdateA conceptual image representing threat groups, used to represent a discussion of threat group naming systems.
54,634
people reacted

Unit 42 Threat Group Naming Update

  • By Ryan Olson
  • July 18, 2022 at 2:00 PM

32

4 min. read

Introducing Actionable Threat Objects and Mitigations (ATOMs)A boxing glove and hand raised to stop it illustrate the concept of cybersecurity adversaries.
31,634
people reacted

Introducing Actionable Threat Objects and Mitigations (ATOMs)

  • By Joseph Opacki
  • September 18, 2020 at 6:30 AM

14

5 min. read

Threat Intelligence Has Never Looked Better – Announcing the Unit 42 Research Portal

  • By Ryan Olson
  • December 18, 2018 at 3:17 PM

5

2 min. read

55,651
people reacted

Paranoid PlugX

  • By Tom Lancaster and Esmid Idrizovic
  • June 27, 2017 at 5:00 AM

6

11 min. read

47,954
people reacted

The New and Improved macOS Backdoor from OceanLotus

  • By Erye Hernandez and Danny Tsechansky
  • June 22, 2017 at 10:00 AM

12

9 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.