Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?
Pictorial representation of KimJongRAT stealer. Image of a computer screen displaying code with a prominent Biohazard symbol in the center, accompanied by the text 'INFECTED' in red, indicating a cybersecurity threat.
 category iconThreat Research June 17, 2025

Exploring a New KimJongRAT Stealer Variant and Its PowerShell Implementation

We analyze two new KimJongRAT stealer variants, combining new research with existing knowledge. One uses a Portable Executable (PE) file and the other PowerShell.

  • PowerShell
  • Infostealer
  • Backdoor
Read now
Pictorial representation of serverless tokens in the cloud. East Asian woman examining data on multiple screens in a high-tech environment, surrounded by digital graphics and code.
 category iconThreat Research June 13, 2025

Serverless Tokens in the Cloud: Exploitation and Detections

  • AWS
  • Microsoft Azure
  • Google Cloud
Read now
Pictorial representation of JSFuck or JSFiretruck. Close-up view of a digital screen displaying a glitched and pixelated image of a skull-like shape.
 category iconThreat Research June 12, 2025

JSFireTruck: Exploring Malicious JavaScript Using JSF*ck as an Obfuscation Technique

  • Malvertising
  • JavaScript
Read now
Pictorial representation of ELF-based malware like NoodleRAT, Winnti, SSHdInjector, Pygmy Goat and AcidPour. Vibrant futuristic cityscape with glowing neon lines, clouds, and a dramatic sky at twilight.
 category iconThreat Research June 10, 2025

The Evolution of Linux Binaries in Targeted Cloud Operations

  • Linux Malware
  • Endpoint
Read now
Pictorial representation of AWS Roles Anywhere. Futuristic cityscape with glowing orange and blue structures, elevated clouds, and illuminated, scattered points representing lights or data points.
 category iconThreat Research June 9, 2025

Roles Here? Roles There? Roles Anywhere: Exploring the Security of AWS IAM Roles Anywhere

  • AWS
  • Kubernetes
Read now
Pictorial representation of Blitz malware. A laptop on a desk displays complex digital graphics, with a red and black color scheme, illuminated by ambient red lighting in a dark room.
 category iconThreat Research June 6, 2025

Blitz Malware: A Tale of Game Cheats and Code Repositories

  • Cryptominers
Read now
Pictorial representation of Azure OpenAI DNS resolution issue. Futuristic cityscape illustration with luminous structures and floating cloud elements, showcasing advanced technology and a dynamic, digitally enhanced environment.
 category iconThreat Research June 3, 2025

Lost in Resolution: Azure OpenAI's DNS Resolution Issue

  • Endpoint
  • Microsoft Azure
Read now
Pictorial representation of LLM content filtering efficacy. Two professionals working intently at computers in a modern office with digital graphs overlaying the image.
 category iconThreat Research June 2, 2025

How Good Are the LLM Guardrails on the Market? A Comparative Study on the Effectiveness of LLM Content Filtering Across Major GenAI Platforms

  • LLMs
  • GenAI
  • Prompt injection
Read now
Pictorial representation of CVE-2025-31324. Nighttime cityscape with illuminated skyscrapers and vibrant light trails in the sky.
 category iconHigh Profile Threats May 23, 2025

Threat Brief: CVE-2025-31324 (Updated May 23)

  • Web shells
Read now
Pictorial representation of Muddled Libra (Scattered Spider). Illustration of a zodiac symbol Libra represented by scales, set against a cosmic purple background with stars.
 category iconThreat Actor Groups May 16, 2025

Threat Group Assessment: Muddled Libra (Updated May 16, 2025)

  • 0ktapus
  • Muddled Libra
  • Social engineering
Read now
A pictorial representation of DarkCloud Stealer. Hands type on a laptop. The image is overlaid with code containing syntax highlighting. The image has a glitch effect, suggesting cybersecurity or a cyber attack.
 category iconThreat Research May 14, 2025

DarkCloud Stealer: Comprehensive Analysis of a New Attack Chain That Employs AutoIt

  • AutoIT
  • Infostealer
Read now
Pictorial representation of .NET malware. Digital code on a screen with the word "System.Hack" highlighted, representing computer programming or cybersecurity concepts.
 category iconThreat Research May 9, 2025

Stealthy .NET Malware: Hiding Malicious Payloads as Bitmap Resources

  • .NET
  • Agent Tesla
  • Microsoft Windows
Read now
A suspected Iranian espionage campaign impersonated a model agency site for data collection, including fictitious models as possible social engineering lures.
 category iconThreat Research May 7, 2025

Iranian Cyber Actors Impersonate Model Agency in Suspected Espionage Operation

  • Iran
  • Social engineering
  • Phishing
Read now
Loader icon View more
Newsletter
UNIT 42 Small Logo Get updates from Unit 42

Peace of mind comes from staying ahead of threats. Subscribe today.

Subscribe for email updates to all Unit 42 threat research.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Invalid captcha!

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Products and Services

  • AI-Powered Network Security Platform
  • Secure AI by Design
  • Prisma AIRS
  • AI Access Security
  • Cloud Delivered Security Services
  • Advanced Threat Prevention
  • Advanced URL Filtering
  • Advanced WildFire
  • Advanced DNS Security
  • Enterprise Data Loss Prevention
  • Enterprise IoT Security
  • Medical IoT Security
  • Industrial OT Security
  • SaaS Security
  • Next-Generation Firewalls
  • Hardware Firewalls
  • Software Firewalls
  • Strata Cloud Manager
  • SD-WAN for NGFW
  • PAN-OS
  • Panorama
  • Secure Access Service Edge
  • Prisma SASE
  • Application Acceleration
  • Autonomous Digital Experience Management
  • Enterprise DLP
  • Prisma Access
  • Prisma Access Browser
  • Prisma SD-WAN
  • Remote Browser Isolation
  • SaaS Security
  • AI-Driven Security Operations Platform
  • Cloud Security
  • Cortex Cloud
  • Application Security
  • Cloud Posture Security
  • Cloud Runtime Security
  • Prisma Cloud
  • AI-Driven SOC
  • Cortex XSIAM
  • Cortex XDR
  • Cortex XSOAR
  • Cortex Xpanse
  • Unit 42 Managed Detection & Response
  • Managed XSIAM
  • Threat Intel and Incident Response Services
  • Proactive Assessments
  • Incident Response
  • Transform Your Security Strategy
  • Discover Threat Intelligence

Company

  • About Us
  • Careers
  • Contact Us
  • Corporate Responsibility
  • Customers
  • Investor Relations
  • Location
  • Newsroom

Popular Links

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Manage Email Preferences
  • Products A-Z
  • Product Certifications
  • Report a Vulnerability
  • Sitemap
  • Tech Docs
  • Unit 42
  • Do Not Sell or Share My Personal Information
PAN logo
  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Copyright © 2025 Palo Alto Networks. All Rights Reserved

  • Youtube
  • Podcast
  • Facebook
  • LinkedIn
  • Twitter
  • Select your language
    Your browser does not support the video tag.

    Default Heading

    Read the article Right Arrow