Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?
Pictorial illustration of Bling Libra on a purple, starry background with orange highlights.
 category iconInsights October 10, 2025

The Golden Scale: Bling Libra and the Evolving Extortion Economy

Scattered Lapsus$ Hunters: Organizations, be aware of the effort of this cybercriminal alliance as they target retail and hospitality for extortion.

  • Bling Libra
  • Extortion
  • Lapsus$
Read now
Pictorial representation of indirect prompt injection. 3D illustration of an advanced, glowing blue artificial intelligence brain on a circuit board with data streams.
 category iconThreat Research October 9, 2025

When AI Remembers Too Much – Persistent Behaviors in Agents’ Memory

  • Amazon
  • GenAI
  • Indirect Prompt Injection
Read now
Pictorial representation of a IUAM ClickFix generator. An artistic depiction of a digital workspace featuring an open laptop with a red virus on the screen, indicating malware.
 category iconThreat Research October 8, 2025

The ClickFix Factory: First Exposure of IUAM ClickFix Generator

  • Bash
  • ClickFix
  • Phishing Kit
Read now
Pictorial representation of a vibrant cityscape emerging from a sea of clouds under a sunset sky.
 category iconInsights October 7, 2025

Responding to Cloud Incidents: A Step-by-Step Guide From the 2025 Unit 42 Global Incident Response Report

  • Cloud Infrastructure Protection
  • Cloud Security
  • Unit 42 Incident Response Report
Read now
Pictorial representation of vulnerabilities in TOTOLINK X6000R. Close-up of a digital display with illuminated red and blue lights indicating a "SYSTEM HACKED" alert.
 category iconThreat Research October 1, 2025

TOTOLINK X6000R: Three New Vulnerabilities Uncovered

  • CVE-2025-52905
  • CVE-2025-52906
  • CVE-2025-52907
Read now
Pictorial representation of APT Phantom Taurus. The silhouette of a bull facing the reviewer and the Taurus constellation inside an orange abstract planet. Abstract, stylized cosmic setting with vibrant blue and purple shapes, representing space and distant planetary bodies.
 category iconThreat Actor Groups September 30, 2025

Phantom Taurus: A New Chinese Nexus APT and the Discovery of the NET-STAR Malware Suite

  • China
  • CL-STA-0043
  • Phantom Taurus
Read now
Pictorial representation of multiple vulnerabilities affecting Cisco products. A dramatic image of a building's glass facade shattering against a backdrop of a vivid orange and red sunset sky over a city skyline.
 category iconInsights September 26, 2025

Threat Insights: Active Exploitation of Cisco ASA Zero Days

  • Cisco
  • CVE-2025-20333
  • CVE-2025-20362
Read now
Pictorial representation of APT Stately Taurus. The silhouette of a bull and the Taurus constellation inside an orange abstract planet. Abstract, stylized cosmic setting with vibrant blue and purple shapes, representing space and distant planetary bodies.
 category iconThreat Actor Groups September 24, 2025

Bookworm to Stately Taurus Using the Unit 42 Attribution Framework

  • Bookworm
  • Stately Taurus
Read now
Pictorial representation of the npm packages supply chain attack. A blurred image focusing on a person typing on a laptop with lines of code visible on the screen, illuminated in blue and red lights, suggestive of intense coding or cyber activities.
 category iconHigh Profile Threats September 23, 2025

"Shai-Hulud" Worm Compromises npm Ecosystem in Supply Chain Attack (Updated September 23)

  • Supply chain
  • JavaScript
  • Credential Harvesting
Read now
Pictorial representation of a wide-scale SEO poisoning campaign. A digital illustration of a world map in a network style, highlighting continents with glowing lines and connectivity points in a red and blue theme.
 category iconThreat Research September 22, 2025

Operation Rewrite: Chinese-Speaking Threat Actors Deploy BadIIS in a Wide Scale SEO Poisoning Campaign

  • CL-UNK-1037
  • SEO poisoning
  • Web shells
Read now
 category iconInsights September 16, 2025

Myth Busting: Why "Innocent Clicks" Don't Exist in Cybersecurity

  • Phishing
  • QR Codes
  • Smishing
Read now
A pictorial representation of code assistant LLMs. An open laptop on a desk displaying a complex digital security interface, with ambient red and black lighting in the background.
 category iconThreat Research September 15, 2025

The Risks of Code Assistant LLMs: Harmful Content, Misuse and Deception

  • Cloud Security
  • GenAI
  • Indirect Prompt Injection
Read now
Pictorial representation of supply chain attacks. A group of people interacting with a dynamic 3D holographic display of colorful, undulating data waves on a table.
 category iconInsights September 12, 2025

Trusted Connections, Hidden Risks: Token Management in the Third-Party Supply Chain

  • Cloud Security
  • Salesforce
  • Salesloft
Read now
Loader icon View more
Newsletter
UNIT 42 Small Logo Get updates from Unit 42

Peace of mind comes from staying ahead of threats. Subscribe today.

Subscribe for email updates to all Unit 42 threat research.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Invalid captcha!

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Products and Services

  • AI-Powered Network Security Platform
  • Secure AI by Design
  • Prisma AIRS
  • AI Access Security
  • Cloud Delivered Security Services
  • Advanced Threat Prevention
  • Advanced URL Filtering
  • Advanced WildFire
  • Advanced DNS Security
  • Enterprise Data Loss Prevention
  • Enterprise IoT Security
  • Medical IoT Security
  • Industrial OT Security
  • SaaS Security
  • Next-Generation Firewalls
  • Hardware Firewalls
  • Software Firewalls
  • Strata Cloud Manager
  • SD-WAN for NGFW
  • PAN-OS
  • Panorama
  • Secure Access Service Edge
  • Prisma SASE
  • Application Acceleration
  • Autonomous Digital Experience Management
  • Enterprise DLP
  • Prisma Access
  • Prisma Browser
  • Prisma SD-WAN
  • Remote Browser Isolation
  • SaaS Security
  • AI-Driven Security Operations Platform
  • Cloud Security
  • Cortex Cloud
  • Application Security
  • Cloud Posture Security
  • Cloud Runtime Security
  • Prisma Cloud
  • AI-Driven SOC
  • Cortex XSIAM
  • Cortex XDR
  • Cortex XSOAR
  • Cortex Xpanse
  • Unit 42 Managed Detection & Response
  • Managed XSIAM
  • Threat Intel and Incident Response Services
  • Proactive Assessments
  • Incident Response
  • Transform Your Security Strategy
  • Discover Threat Intelligence

Company

  • About Us
  • Careers
  • Contact Us
  • Corporate Responsibility
  • Customers
  • Investor Relations
  • Location
  • Newsroom

Popular Links

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Manage Email Preferences
  • Products A-Z
  • Product Certifications
  • Report a Vulnerability
  • Sitemap
  • Tech Docs
  • Unit 42
  • Do Not Sell or Share My Personal Information
PAN logo
  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Copyright © 2025 Palo Alto Networks. All Rights Reserved

  • Youtube
  • Podcast
  • Facebook
  • LinkedIn
  • Twitter
  • Select your language
    Your browser does not support the video tag.

    Default Heading

    Read the article Right Arrow