Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?
Pictorial representation of a man silhouetted against a background of towering skyscarpers covered in colorful data and abstract code.
 category iconInsights August 26, 2025

Data Is the New Diamond: Heists in the Digital Age

Unit 42 explores the similarities between the social engineering and reconnaissance tactics used by financially motivated criminals.

  • Bling Libra
  • Extortion
  • Social engineering
Read now
 category iconLearning Hub August 25, 2025

Insights: Telling You What We Really Think

  • Insights
  • Opinion
  • Threat Research Communications
Read now
Pictorial representation of CVE-2024-36401. Digital illustration of a map of North America with interconnected glowing lines and dots symbolizing network connections across the continent.
 category iconThreat Research August 21, 2025

Your Connection, Their Cash: Threat Actors Misuse SDKs to Sell Your Bandwidth

  • CVE-2024-36401
Read now
Pictorial representation of logit-gap steering and LLMs. Abstract digital artwork featuring a cityscape silhouette with glowing blue and orange lights, set against a bokeh background.
 category iconLearning Hub August 20, 2025

Logit-Gap Steering: A New Frontier in Understanding and Probing LLM Safety

  • GenAI
  • LLM
Read now
Pictorial representation of phishing bait using AI. A luminous cube labeled "AI" centrally placed on a futuristic circuit board landscape with glowing blue lights and connections.
 category iconThreat Research August 19, 2025

Fashionable Phishing Bait: GenAI on the Hook

  • GenAI
  • Phishing
Read now
Pictorial representation of Donut malware. Image showing a person typing on a laptop with a graphic of colorful data streams flowing from the screen, symbolizing digital data transfer and technology.
 category iconLearning Hub August 14, 2025

A Mega Malware Analysis Tutorial Featuring Donut-Generated Shellcode

  • .NET
  • IDA Pro
  • RemcosRAT
Read now
Pictorial representation of Muddled Libra (aka Scattered Spider). Illustration of the constellation Libra depicted by scales, set against a background of deep red and purple space with star speckles.
 category iconInsights August 12, 2025

Muddled Libra’s Strike Teams: Amalgamated Evil

  • Muddled Libra
Read now
Pictorial representation of vulnerabilities found in ICONICS. Digital illustration of a global network featuring interconnected lines and nodes over a map of the world, highlighted with neon lights and digital elements, emphasizing connectivity and modern technology.
 category iconThreat Research August 11, 2025

Keys to the Kingdom: Erlang/OTP SSH Vulnerability Analysis and Exploits Observed in the Wild

  • 5G
  • CVE-2025-32433
  • Erlang
Read now
Pictorial representation of the infostealer DarkCloud Stealer. Close-up of a circuit board with glowing red data streams and multiple microchips, highlighting advanced technology.
 category iconThreat Research August 7, 2025

New Infection Chain and ConfuserEx-Based Obfuscation for DarkCloud Stealer

  • Infostealer
  • Anti-analysis
  • Obfuscation
Read now
Pictorial representation of Muddled Libra/Scattered Spider. Three professionals analyzing data on multiple computer screens in a high-tech workspace.
 category iconLearning Hub August 6, 2025

Muddled Libra: Why Are We So Obsessed With You?

  • Muddled Libra
  • Scattered Spider
  • DragonForce
Read now
Pictorial representation of a BadSuccessor attack. A person analyzing data on a computer screen in a busy office environment, with digital graphs and code overlaying the image.
 category iconThreat Research August 6, 2025

When Good Accounts Go Bad: Exploiting Delegated Managed Service Accounts in Active Directory

  • Active Directory
  • Microsoft
  • PowerShell
Read now
Pictorial representation of Project AK47. A Black woman stares intently at a screen, suggesting analysis of cybersecurity activity.
 category iconThreat Research August 5, 2025

Project AK47: Uncovering a Link to the SharePoint Vulnerability Attacks

  • SharePoint
Read now
Constellation image representing the constellation schema used by Palo Alto Networks Unit 42 to track nation-state and cybercrime threat actor groups
 category iconThreat Actor Groups August 1, 2025

Threat Actor Groups Tracked by Palo Alto Networks Unit 42 (Updated Aug. 1, 2025)

  • Academic Serpens
  • Agent Serpens
  • Agonizing Serpens
Read now
Loader icon View more
Newsletter
UNIT 42 Small Logo Get updates from Unit 42

Peace of mind comes from staying ahead of threats. Subscribe today.

Subscribe for email updates to all Unit 42 threat research.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Invalid captcha!

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Products and Services

  • AI-Powered Network Security Platform
  • Secure AI by Design
  • Prisma AIRS
  • AI Access Security
  • Cloud Delivered Security Services
  • Advanced Threat Prevention
  • Advanced URL Filtering
  • Advanced WildFire
  • Advanced DNS Security
  • Enterprise Data Loss Prevention
  • Enterprise IoT Security
  • Medical IoT Security
  • Industrial OT Security
  • SaaS Security
  • Next-Generation Firewalls
  • Hardware Firewalls
  • Software Firewalls
  • Strata Cloud Manager
  • SD-WAN for NGFW
  • PAN-OS
  • Panorama
  • Secure Access Service Edge
  • Prisma SASE
  • Application Acceleration
  • Autonomous Digital Experience Management
  • Enterprise DLP
  • Prisma Access
  • Prisma Access Browser
  • Prisma SD-WAN
  • Remote Browser Isolation
  • SaaS Security
  • AI-Driven Security Operations Platform
  • Cloud Security
  • Cortex Cloud
  • Application Security
  • Cloud Posture Security
  • Cloud Runtime Security
  • Prisma Cloud
  • AI-Driven SOC
  • Cortex XSIAM
  • Cortex XDR
  • Cortex XSOAR
  • Cortex Xpanse
  • Unit 42 Managed Detection & Response
  • Managed XSIAM
  • Threat Intel and Incident Response Services
  • Proactive Assessments
  • Incident Response
  • Transform Your Security Strategy
  • Discover Threat Intelligence

Company

  • About Us
  • Careers
  • Contact Us
  • Corporate Responsibility
  • Customers
  • Investor Relations
  • Location
  • Newsroom

Popular Links

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Manage Email Preferences
  • Products A-Z
  • Product Certifications
  • Report a Vulnerability
  • Sitemap
  • Tech Docs
  • Unit 42
  • Do Not Sell or Share My Personal Information
PAN logo
  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Copyright © 2025 Palo Alto Networks. All Rights Reserved

  • Youtube
  • Podcast
  • Facebook
  • LinkedIn
  • Twitter
  • Select your language
    Your browser does not support the video tag.

    Default Heading

    Read the article Right Arrow