Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?
Pictorial representation of the npm packages supply chain attack. A blurred image focusing on a person typing on a laptop with lines of code visible on the screen, illuminated in blue and red lights, suggestive of intense coding or cyber activities.
 category iconHigh Profile Threats September 17, 2025

"Shai-Hulud" Worm Compromises npm Ecosystem in Supply Chain Attack (Updated September 19)

Self-replicating worm “Shai-Hulud” has compromised hundreds of software packages in a supply chain attack targeting the npm ecosystem. We discuss scope and more.

  • Supply chain
  • JavaScript
  • Credential Harvesting
Read now
 category iconInsights September 16, 2025

Myth Busting: Why "Innocent Clicks" Don't Exist in Cybersecurity

  • Phishing
  • QR Codes
  • Smishing
Read now
A pictorial representation of code assistant LLMs. An open laptop on a desk displaying a complex digital security interface, with ambient red and black lighting in the background.
 category iconThreat Research September 15, 2025

The Risks of Code Assistant LLMs: Harmful Content, Misuse and Deception

  • Cloud Security
  • GenAI
  • Indirect Prompt Injection
Read now
Pictorial representation of supply chain attacks. A group of people interacting with a dynamic 3D holographic display of colorful, undulating data waves on a table.
 category iconInsights September 12, 2025

Trusted Connections, Hidden Risks: Token Management in the Third-Party Supply Chain

  • Cloud Security
  • Salesforce
  • Salesloft
Read now
Pictorial representation of AdaptixC2. Digital iris with binary code, emphasizing cybersecurity and technology concepts.
 category iconThreat Research September 10, 2025

AdaptixC2: A New Open-Source Framework Leveraged in Real-World Attacks

  • C2
  • DLL
  • Open source
Read now
Pictorial representation of individuals looking at computer monitors with large, glowing world map on a screen behind them.
 category iconInsights September 9, 2025

Data Is the New Diamond: Latest Moves by Hackers and Defenders

  • Muddled Libra
  • Bling Libra
  • Extortion
Read now
Pictorial representation of model namespace reuse. A vibrant digital illustration featuring a glowing cloud icon with a padlock, symbolizing cloud security technology, set against a backdrop of glowing circuit lines in blue and orange.
 category iconThreat Research September 3, 2025

Model Namespace Reuse: An AI Supply-Chain Attack Exploiting Model Name Trust

  • Azure
  • GenAI
  • Google
Read now
A pictorial representation featuring a large microphone positioned in front of a white desk where a laptop, a tablet, an open notebook, and a pair of headphones are arranged, all lit by a bright background light.
 category iconInsights September 2, 2025

Why Threat Intelligence: A Conversation With Unit 42 Interns

  • Cybersecurity
  • Threat intelligence
  • Unit 42
Read now
Pictorial representation of Salesforce compromised by attackers. Colorful abstract digital artwork featuring a gradient of red to blue hues with a raised, spike-like texture pattern resembling a city skyline.
 category iconHigh Profile Threats September 2, 2025

Threat Brief: Salesloft Drift Integration Used To Compromise Salesforce Instances

  • Credential-based attacks
  • Data exfiltration
  • Salesforce
Read now
Pictorial representation of a man silhouetted against a background of towering skyscarpers covered in colorful data and abstract code.
 category iconInsights August 26, 2025

Data Is the New Diamond: Heists in the Digital Age

  • Bling Libra
  • Extortion
  • Social engineering
Read now
 category iconInsights August 25, 2025

Insights: Telling You What We Really Think

  • Insights
  • Opinion
  • Threat Research Communications
Read now
Pictorial representation of CVE-2024-36401. Digital illustration of a map of North America with interconnected glowing lines and dots symbolizing network connections across the continent.
 category iconThreat Research August 21, 2025

Your Connection, Their Cash: Threat Actors Misuse SDKs to Sell Your Bandwidth

  • CVE-2024-36401
Read now
Pictorial representation of logit-gap steering and LLMs. Abstract digital artwork featuring a cityscape silhouette with glowing blue and orange lights, set against a bokeh background.
 category iconLearning Hub August 20, 2025

Logit-Gap Steering: A New Frontier in Understanding and Probing LLM Safety

  • GenAI
  • LLM
Read now
Loader icon View more
Newsletter
UNIT 42 Small Logo Get updates from Unit 42

Peace of mind comes from staying ahead of threats. Subscribe today.

Subscribe for email updates to all Unit 42 threat research.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Invalid captcha!

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Products and Services

  • AI-Powered Network Security Platform
  • Secure AI by Design
  • Prisma AIRS
  • AI Access Security
  • Cloud Delivered Security Services
  • Advanced Threat Prevention
  • Advanced URL Filtering
  • Advanced WildFire
  • Advanced DNS Security
  • Enterprise Data Loss Prevention
  • Enterprise IoT Security
  • Medical IoT Security
  • Industrial OT Security
  • SaaS Security
  • Next-Generation Firewalls
  • Hardware Firewalls
  • Software Firewalls
  • Strata Cloud Manager
  • SD-WAN for NGFW
  • PAN-OS
  • Panorama
  • Secure Access Service Edge
  • Prisma SASE
  • Application Acceleration
  • Autonomous Digital Experience Management
  • Enterprise DLP
  • Prisma Access
  • Prisma Browser
  • Prisma SD-WAN
  • Remote Browser Isolation
  • SaaS Security
  • AI-Driven Security Operations Platform
  • Cloud Security
  • Cortex Cloud
  • Application Security
  • Cloud Posture Security
  • Cloud Runtime Security
  • Prisma Cloud
  • AI-Driven SOC
  • Cortex XSIAM
  • Cortex XDR
  • Cortex XSOAR
  • Cortex Xpanse
  • Unit 42 Managed Detection & Response
  • Managed XSIAM
  • Threat Intel and Incident Response Services
  • Proactive Assessments
  • Incident Response
  • Transform Your Security Strategy
  • Discover Threat Intelligence

Company

  • About Us
  • Careers
  • Contact Us
  • Corporate Responsibility
  • Customers
  • Investor Relations
  • Location
  • Newsroom

Popular Links

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Manage Email Preferences
  • Products A-Z
  • Product Certifications
  • Report a Vulnerability
  • Sitemap
  • Tech Docs
  • Unit 42
  • Do Not Sell or Share My Personal Information
PAN logo
  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Copyright © 2025 Palo Alto Networks. All Rights Reserved

  • Youtube
  • Podcast
  • Facebook
  • LinkedIn
  • Twitter
  • Select your language
    Your browser does not support the video tag.

    Default Heading

    Read the article Right Arrow