Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
Unit 42
unit42.paloaltonetworks.com
Data Is the New
Diamond
:
Heists
in the Digital Age
unit42.paloaltonetworks.com
·
37w
Insights
:
Telling
You What We Really Think
unit42.paloaltonetworks.com
·
37w
Your Connection, Their Cash: Threat Actors
Misuse
SDKs
to Sell Your Bandwidth
unit42.paloaltonetworks.com
·
38w
Logit-Gap
Steering
: A New Frontier in Understanding and Probing LLM Safety
unit42.paloaltonetworks.com
·
38w
Fashionable
Phishing
Bait
: GenAI on the Hook
unit42.paloaltonetworks.com
·
38w
A Mega Malware Analysis Tutorial Featuring
Donut-Generated
Shellcode
unit42.paloaltonetworks.com
·
39w
Muddled
Libra’s Strike Teams:
Amalgamated
Evil
unit42.paloaltonetworks.com
·
39w
Keys to the Kingdom:
Erlang/OTP
SSH Vulnerability Analysis and Exploits Observed in the Wild
unit42.paloaltonetworks.com
·
40w
New Infection Chain and
ConfuserEx-Based
Obfuscation for
DarkCloud
Stealer
unit42.paloaltonetworks.com
·
40w
Muddled
Libra
: Why Are We So Obsessed With You?
unit42.paloaltonetworks.com
·
40w
When Good Accounts Go Bad:
Exploiting
Delegated
Managed Service Accounts in Active Directory
unit42.paloaltonetworks.com
·
40w
Project
AK47
:
Uncovering
a Link to the SharePoint Vulnerability Attacks
unit42.paloaltonetworks.com
·
40w
Threat Actor Groups
Tracked
by
Palo
Alto Networks Unit 42 (Updated Aug. 1, 2025)
unit42.paloaltonetworks.com
·
41w
Introducing
Unit
42’s
Attribution
Framework
unit42.paloaltonetworks.com
·
41w
2025
Unit
42 Global
Incident
Response Report: Social Engineering Edition
unit42.paloaltonetworks.com
·
41w
The
Covert
Operator's Playbook:
Infiltration
of Global Telecom Networks
unit42.paloaltonetworks.com
·
41w
The
Ηоmоgraph
Illusion
: Not Everything Is As It Seems
unit42.paloaltonetworks.com
·
42w
Cloud
Logging
for Security and Beyond
unit42.paloaltonetworks.com
·
42w
Active
Exploitation
of Microsoft
SharePoint
Vulnerabilities: Threat Brief
unit42.paloaltonetworks.com
·
42w
Behind the Clouds: Attackers Targeting Governments in Southeast Asia Implement Novel
Covert
C2
Communication
unit42.paloaltonetworks.com
·
44w
« Page 5
·
Page 7 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help