Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
Unit 42
unit42.paloaltonetworks.com
Gremlin
Stealer
's Evolved Tactics: Hiding in Plain Sight With Resource Files
unit42.paloaltonetworks.com
·
2d
Inside AD CS Escalation:
Unpacking
Advanced
Misuse
Techniques and Tools
unit42.paloaltonetworks.com
·
6d
Threat Brief:
Exploitation
of PAN-OS
Captive
Portal Zero-Day for Unauthenticated Remote Code Execution
unit42.paloaltonetworks.com
·
1w
Copy
Fail: What You Need to Know About the Most
Severe
Linux Threat in Years
unit42.paloaltonetworks.com
·
1w
Essential
Data Sources for Detection Beyond the
Endpoint
unit42.paloaltonetworks.com
·
2w
That AI Extension
Helping
You Write
Emails
? It’s Reading Them First
unit42.paloaltonetworks.com
·
2w
The
npm
Threat Landscape: Attack Surface and
Mitigations
unit42.paloaltonetworks.com
·
3w
TGR-STA-1030
: New Activity in Central and South America
unit42.paloaltonetworks.com
·
3w
Frontier
AI and the Future of Defense: Your Top Questions
Answered
unit42.paloaltonetworks.com
·
3w
Can AI Attack the Cloud?
Lessons
From Building an Autonomous Cloud
Offensive
Multi-Agent System
unit42.paloaltonetworks.com
·
3w
When Wi-Fi Encryption Fails:
Protecting
Your Enterprise from
AirSnitch
Attacks
unit42.paloaltonetworks.com
·
3w
Fracturing
Software Security With
Frontier
AI Models
unit42.paloaltonetworks.com
·
3w
A Deep Dive Into
Attempted
Exploitation
of CVE-2023-33538
unit42.paloaltonetworks.com
·
4w
Cracks
in the
Bedrock
: Agent God Mode
unit42.paloaltonetworks.com
·
5w
Cracks in the Bedrock:
Escaping
the AWS
AgentCore
Sandbox
unit42.paloaltonetworks.com
·
5w
Understanding Current Threats to
Kubernetes
Environments
unit42.paloaltonetworks.com
·
5w
When an
Attacker
Meets a Group of Agents: Navigating Amazon
Bedrock
's Multi-Agent Applications
unit42.paloaltonetworks.com
·
6w
·
DEV
Threat Brief:
Widespread
Impact of the
Axios
Supply Chain Attack
unit42.paloaltonetworks.com
·
6w
Weaponizing the
Protectors
:
TeamPCP
’s Multi-Stage Supply Chain Attack on Security Infrastructure
unit42.paloaltonetworks.com
·
6w
Double Agents: Exposing Security Blind Spots in
GCP
Vertex
AI
unit42.paloaltonetworks.com
·
6w
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help