Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
Unit 42
unit42.paloaltonetworks.com
Anatomy
of an Attack: The "
BlackSuit
Blitz" at a Global Equipment Manufacturer
unit42.paloaltonetworks.com
·
30w
The Golden Scale:
Bling
Libra
and the Evolving Extortion Economy
unit42.paloaltonetworks.com
·
31w
When AI
Remembers
Too Much – Persistent
Behaviors
in Agents’ Memory
unit42.paloaltonetworks.com
·
31w
The
ClickFix
Factory: First Exposure of
IUAM
ClickFix
Generator
unit42.paloaltonetworks.com
·
31w
Responding
to Cloud
Incidents
A Step-by-Step Guide from the 2025 Unit 42 Global Incident Response Report
unit42.paloaltonetworks.com
·
31w
TOTOLINK
X6000R
: Three New Vulnerabilities Uncovered
unit42.paloaltonetworks.com
·
32w
Phantom
Taurus
: A New Chinese Nexus
APT
and the Discovery of the NET-STAR Malware Suite
unit42.paloaltonetworks.com
·
32w
Phantom
Taurus
: A New Chinese Nexus
APT
and the Discovery of the NET-STAR Malware Suite
unit42.paloaltonetworks.com
·
32w
·
r/blueteamsec
Threat Insights: Active
Exploitation
of Cisco
ASA
Zero Days
unit42.paloaltonetworks.com
·
33w
Bookworm
to
Stately
Taurus Using the Unit 42 Attribution Framework
unit42.paloaltonetworks.com
·
33w
·
r/SecOpsDaily
Operation
Rewrite
: Chinese-Speaking Threat Actors Deploy
BadIIS
in a Wide Scale SEO Poisoning Campaign
unit42.paloaltonetworks.com
·
33w
·
r/worldTechnology
"
Shai-Hulud
" Worm
Compromises
npm Ecosystem in Supply Chain Attack
unit42.paloaltonetworks.com
·
34w
Myth
Busting
: Why "
Innocent
Clicks" Don't Exist in Cybersecurity
unit42.paloaltonetworks.com
·
34w
The Risks of Code Assistant LLMs: Harmful Content,
Misuse
and
Deception
unit42.paloaltonetworks.com
·
34w
Trusted
Connections
, Hidden Risks: Token Management in the Third-Party Supply Chain
unit42.paloaltonetworks.com
·
35w
AdaptixC2
: A New Open-Source Framework
Leveraged
in Real-World Attacks
unit42.paloaltonetworks.com
·
35w
Data Is the New
Diamond
: Latest Moves by Hackers and
Defenders
unit42.paloaltonetworks.com
·
35w
Model
Namespace
Reuse
: An AI Supply-Chain Attack Exploiting Model Name Trust
unit42.paloaltonetworks.com
·
36w
Why Threat Intelligence: A
Conversation
With Unit 42
Interns
unit42.paloaltonetworks.com
·
36w
Threat Brief:
Salesloft
Drift Integration Used To Compromise Salesforce
Instances
unit42.paloaltonetworks.com
·
36w
« Page 4
·
Page 6 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help