Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?
Pictorial representation of RaaS RansomHouse. Digital representation of cybersecurity concept with a padlock superimposed over computer circuit boards, symbolizing data protection and encryption technologies.
 category iconThreat Research December 17, 2025

From Linear to Complex: An Upgrade in RansomHouse Encryption

Operators behind RansomHouse, a ransomware-as-a-service (RaaS) group, have upgraded their encryption methods from single-phase to complex and layered.

  • ESXi
  • Jolly Scorpius
  • RansomHouse
Read now
Pictorial representation of a laptop placed on a wooden table with a person's hand holding a mobile phone in the background.
 category iconInsights December 16, 2025

Stay Secure: Why Cyber Hygiene Should Be Part of Your Personal Hygiene

  • Cybersecurity
  • MFA
  • Patchwork
Read now
Pictorial representation of CVE-2025-55182 (React) and CVE-2025-66478 (Next.js). Close-up of a digital display on electronic equipment with illuminated text reading "SYSTEM HACKED" in red, set against a blurred background of blue and red lights.
 category iconHigh Profile Threats December 12, 2025

Exploitation of Critical Vulnerability in React Server Components (Updated December 12)

  • Cobalt Strike
  • CVE-2025-55182
  • CVE-2025-66478
Read now
Pictorial representation of APT Ashen Lepus. The silhouette of a hare and the Lepus constellation inside an orange abstract planet. Abstract, stylized cosmic setting with vibrant blue and purple shapes, representing space and distant planetary bodies.
 category iconThreat Actor Groups December 11, 2025

Hamas-Affiliated Ashen Lepus Targets Middle Eastern Diplomatic Entities With New AshTag Malware Suite

  • Ashen Lepus
  • Espionage
  • WIRTE
Read now
Pictorial representation of 01flip ransomware written in Rust. Digital artwork of a pixelated U.S. dollar bill disintegrating into small blocks against a blue data matrix background.
 category iconThreat Research December 10, 2025

01flip: Multi-Platform Ransomware Written in Rust

  • Bitcoin
  • CL-CRI-103
  • Cryptocurrency
Read now
Pictorial representation of prompt injection attacks. Abstract digital art depicting colorful lines flowing across a circuit board with glowing nodes and icons, conveying a sense of connectivity and data movement.
 category iconThreat Research December 5, 2025

New Prompt Injection Attack Vectors Through MCP Sampling

  • LLM
  • Prompt injection
Read now
Pictorial representation of a man critically analyzing multiple displays.
 category iconInsights December 2, 2025

The Browser Defense Playbook: Stopping the Attacks That Start on Your Screen

  • Cloud Security
  • Defense
Read now
Pictorial representation of a bokeh style graphic showing purple and orange spheres with interconnected white network lines.
 category iconInsights November 26, 2025

The Golden Scale: 'Tis the Season for Unwanted Gifts

  • Bling Libra
  • Lapsus$
  • Leak site
Read now
Pictorial representation of the npm packages supply chain attack. A blurred image focusing on a person typing on a laptop with lines of code visible on the screen, illuminated in blue and red lights, suggestive of intense coding or cyber activities.
 category iconHigh Profile Threats November 25, 2025

"Shai-Hulud" Worm Compromises npm Ecosystem in Supply Chain Attack (Updated November 26)

  • Supply chain
  • JavaScript
  • Credential Harvesting
Read now
Pictorial representation of malicious LLMs. Close-up view of a digital wall displaying various glowing icons, representing a high-tech network interface.
 category iconThreat Research November 25, 2025

The Dual-Use Dilemma of AI: Malicious LLMs

  • Credential Harvesting
  • Data exfiltration
  • LLM
Read now
Pictorial representation of APT Howling Scorpius. The silhouette of a scorpion and the Scorpius constellation inside an orange abstract planet. Abstract, stylized cosmic setting with vibrant blue and purple shapes, representing space and distant planetary bodies.
 category iconInsights November 18, 2025

Anatomy of an Akira Ransomware Attack: When a Fake CAPTCHA Led to 42 Days of Compromise

  • Akira ransomware
  • Howling Scorpius
  • Unit 42
Read now
Pictorial representation of Gh0st RAT malware. A woman analyzes code on a computer screen in an office setting, with another individual working in the background.
 category iconThreat Research November 14, 2025

Digital Doppelgangers: Anatomy of Evolving Impersonation Campaigns Distributing Gh0st RAT

  • DLL Sideloading
  • Gh0st Rat
  • PDNS
Read now
Pictorial representation of an authentication coercion attack. Panoramic view of a city skyline at night, featuring vibrant light beams from skyscrapers and a deep blue sky.
 category iconThreat Research November 10, 2025

You Thought It Was Over? Authentication Coercion Keeps Evolving

  • Mimikatz
  • PrintNightmare
  • Privilege escalation
Read now
Loader icon View more
Newsletter
UNIT 42 Small Logo Get updates from Unit 42

Peace of mind comes from staying ahead of threats. Subscribe today.

Subscribe for email updates to all Unit 42 threat research.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Invalid captcha!

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Products and Services

  • AI-Powered Network Security Platform
  • Secure AI by Design
  • Prisma AIRS
  • AI Access Security
  • Cloud Delivered Security Services
  • Advanced Threat Prevention
  • Advanced URL Filtering
  • Advanced WildFire
  • Advanced DNS Security
  • Enterprise Data Loss Prevention
  • Enterprise IoT Security
  • Medical IoT Security
  • Industrial OT Security
  • SaaS Security
  • Next-Generation Firewalls
  • Hardware Firewalls
  • Software Firewalls
  • Strata Cloud Manager
  • SD-WAN for NGFW
  • PAN-OS
  • Panorama
  • Secure Access Service Edge
  • Prisma SASE
  • Application Acceleration
  • Autonomous Digital Experience Management
  • Enterprise DLP
  • Prisma Access
  • Prisma Browser
  • Prisma SD-WAN
  • Remote Browser Isolation
  • SaaS Security
  • AI-Driven Security Operations Platform
  • Cloud Security
  • Cortex Cloud
  • Application Security
  • Cloud Posture Security
  • Cloud Runtime Security
  • Prisma Cloud
  • AI-Driven SOC
  • Cortex XSIAM
  • Cortex XDR
  • Cortex XSOAR
  • Cortex Xpanse
  • Unit 42 Managed Detection & Response
  • Managed XSIAM
  • Threat Intel and Incident Response Services
  • Proactive Assessments
  • Incident Response
  • Transform Your Security Strategy
  • Discover Threat Intelligence

Company

  • About Us
  • Careers
  • Contact Us
  • Corporate Responsibility
  • Customers
  • Investor Relations
  • Location
  • Newsroom

Popular Links

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Manage Email Preferences
  • Products A-Z
  • Product Certifications
  • Report a Vulnerability
  • Sitemap
  • Tech Docs
  • Unit 42
  • Do Not Sell or Share My Personal Information
PAN logo
  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Copyright © 2025 Palo Alto Networks. All Rights Reserved

  • Youtube
  • Podcast
  • Facebook
  • LinkedIn
  • Twitter
  • Select your language
    Your browser does not support the video tag.

    Default Heading

    Read the article Right Arrow