Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?
A suspected Iranian espionage campaign impersonated a model agency site for data collection, including fictitious models as possible social engineering lures.
 category iconThreat Research May 7, 2025

Iranian Cyber Actors Impersonate Model Agency in Suspected Espionage Operation

A suspected Iranian espionage campaign impersonated a model agency site for data collection, including fictitious models as possible social engineering lures.

  • Iran
  • Social engineering
  • Phishing
Read now
Pictorial representation of Lampion. Digital abstract background featuring binary codes and connections, highlighted in blue tones, representing data and network concepts.
 category iconThreat Research May 6, 2025

Lampion Is Back With ClickFix Lures

  • PowerShell
  • VBScript
Read now
Pictorial representation of agentic AI. Abstract image of a digital network with glowing blue and red nodes on a grid, representing high-tech data communication.
 category iconThreat Research May 1, 2025

AI Agents Are Here. So Are the Threats.

  • Prompt injection
Read now
Pictorial representation of Gremlin Stealer. Person sitting at a desk with multiple computer monitors displaying various data, in a dimly-lit room with ambient red lighting.
 category iconThreat Research April 29, 2025

Gremlin Stealer: New Stealer on Sale in Underground Forum

  • Cryptocurrency
  • Infostealer
  • Telegram
Read now
Pictorial representation of the ransomware landscape. Digital artwork of a disintegrating U.S. dollar bill with pixelated effects on a cyber-inspired background.
 category iconTrend Reports April 23, 2025

Extortion and Ransomware Trends January-March 2025

  • BianLian
  • Akira ransomware
  • Muddled Libra
Read now
Pictorial representation of synthetic identity creation. A white man stands before a large digital display featuring various security camera feeds and a prominent close-up of an individual's face, illustrating a high-tech surveillance environment.
 category iconThreat Research April 21, 2025

False Face: Unit 42 Demonstrates the Alarming Ease of Synthetic Identity Creation

  • DPRK
  • Social engineering
  • Wagemole
Read now
Pictorial representation of multilayered attack chain. Biohazard symbol displayed over computer code, indicating a detected cybersecurity threat.
 category iconThreat Research April 16, 2025

Cascading Shadows: An Attack Chain Approach to Avoid Detection and Complicate Analysis

  • XLoader
  • RemcosRAT
Read now
Pictorial representation of APT Slow Pisces. The silhouette of two fish and the Pisces constellation inside an orange abstract planet. Background of stars and swirling purple and blue colors.
 category iconThreat Actor Groups April 14, 2025

Slow Pisces Targets Developers With Coding Challenges and Introduces New Customized Python Malware

  • Infostealer
  • DPRK
  • Cryptocurrency
Read now
Pictorial representation of securing GenAI. A glowing cube labeled "AI" centrally positioned on a circuit board with intricate electronic connections and blue lighting.
 category iconTrend Reports April 9, 2025

How Prompt Attacks Exploit GenAI and How to Fight Back

  • LLM
  • GenAI
  • Prompt injection
Read now
Digital representation of vulnerabilities in OpenID Connect (OIDC) implementations for cloud access. A cloud computing network over a blurred background of server racks in a data center.
 category iconThreat Research April 4, 2025

OH-MY-DC: OIDC Misconfigurations in CI/CD

  • JSON
Read now
Pictorial representation of a QR code phishing campaign. Digital artwork of a futuristic, glowing shield disintegrating into small particles, set against a dark blue, speckled background.
 category iconThreat Research April 1, 2025

Evolution of Sophisticated Phishing Tactics: The QR Code Phenomenon

  • Phishing
  • Social engineering
Read now
Pictorial representation of cloud alert trends. Digital illustration of a glowing cloud composed of binary code, surrounded by dynamic red and blue light streaks, symbolizing cloud computing technology.
 category iconThreat Research March 27, 2025

Cloud Threats on the Rise: Alert Trends Show Intensified Attacker Focus on IAM, Exfiltration

  • API attacks
  • Containers
  • IAM
Read now
Pictorial representation of GitHub Actions supply chain attack. Digital illustration of a glowing blue brain connected to a network of lines and lights.
 category iconHigh Profile Threats March 20, 2025

GitHub Actions Supply Chain Attack: A Targeted Attack on Coinbase Expanded to the Widespread tj-actions/changed-files Incident: Threat Assessment (Updated 4/2)

  • GitHub
  • Supply chain
Read now
Loader icon View more
Newsletter
UNIT 42 Small Logo Get updates from Unit 42

Peace of mind comes from staying ahead of threats. Contact us today.

Subscribe for email updates to all Unit 42 threat research.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Invalid captcha!

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Products and Services

  • AI-Powered Network Security Platform
  • Secure AI by Design
  • Prisma AIRS
  • AI Access Security
  • Cloud Delivered Security Services
  • Advanced Threat Prevention
  • Advanced URL Filtering
  • Advanced WildFire
  • Advanced DNS Security
  • Enterprise Data Loss Prevention
  • Enterprise IoT Security
  • Medical IoT Security
  • Industrial OT Security
  • SaaS Security
  • Next-Generation Firewalls
  • Hardware Firewalls
  • Software Firewalls
  • Strata Cloud Manager
  • SD-WAN for NGFW
  • PAN-OS
  • Panorama
  • Secure Access Service Edge
  • Prisma SASE
  • Application Acceleration
  • Autonomous Digital Experience Management
  • Enterprise DLP
  • Prisma Access
  • Prisma Access Browser
  • Prisma SD-WAN
  • Remote Browser Isolation
  • SaaS Security
  • AI-Driven Security Operations Platform
  • Cloud Security
  • Cortex Cloud
  • Application Security
  • Cloud Posture Security
  • Cloud Runtime Security
  • Prisma Cloud
  • AI-Driven SOC
  • Cortex XSIAM
  • Cortex XDR
  • Cortex XSOAR
  • Cortex Xpanse
  • Unit 42 Managed Detection & Response
  • Managed XSIAM
  • Threat Intel and Incident Response Services
  • Proactive Assessments
  • Incident Response
  • Transform Your Security Strategy
  • Discover Threat Intelligence

Company

  • About Us
  • Careers
  • Contact Us
  • Corporate Responsibility
  • Customers
  • Investor Relations
  • Location
  • Newsroom

Popular Links

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Manage Email Preferences
  • Products A-Z
  • Product Certifications
  • Report a Vulnerability
  • Sitemap
  • Tech Docs
  • Unit 42
  • Do Not Sell or Share My Personal Information
PAN logo
  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Copyright © 2025 Palo Alto Networks. All Rights Reserved

  • Youtube
  • Podcast
  • Facebook
  • LinkedIn
  • Twitter
  • Select your language
    Your browser does not support the video tag.

    Default Heading

    Read the article Right Arrow