Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
Unit 42
unit42.paloaltonetworks.com
Evolving
Tactics of SLOW#
TEMPEST
: A Deep Dive Into Advanced Malware Techniques
unit42.paloaltonetworks.com
·
44w
Fix the Click:
Preventing
the
ClickFix
Attack Vector
unit42.paloaltonetworks.com
·
44w
GoldMelody
’s Hidden
Chords
: Initial Access Broker In-Memory IIS Modules Revealed
unit42.paloaltonetworks.com
·
44w
Apache Under the Lens:
Tomcat
’s Partial PUT and
Camel
’s Header Hijack
unit42.paloaltonetworks.com
·
45w
Windows
Shortcut
(
LNK
) Malware Strategies
unit42.paloaltonetworks.com
·
45w
Threat
Brief
:
Escalation
of Cyber Risk Related to Iran
unit42.paloaltonetworks.com
·
46w
Cybercriminals
Abuse
Open-Source Tools To Target Africa’s Financial Sector
unit42.paloaltonetworks.com
·
46w
Resurgence of the
Prometei
Botnet
unit42.paloaltonetworks.com
·
47w
Exploring a New
KimJongRAT
Stealer
Variant and Its PowerShell Implementation
unit42.paloaltonetworks.com
·
47w
Serverless
Tokens in the Cloud: Exploitation and
Detections
unit42.paloaltonetworks.com
·
48w
JSFireTruck
: Exploring Malicious JavaScript Using JSF*ck as an
Obfuscation
Technique
unit42.paloaltonetworks.com
·
48w
·
Hacker News
The Evolution of Linux
Binaries
in
Targeted
Cloud Operations
unit42.paloaltonetworks.com
·
48w
·
Hacker News
Roles Here? Roles There? Roles
Anywhere
: Exploring the Security of AWS
IAM
Roles
Anywhere
unit42.paloaltonetworks.com
·
49w
·
Hacker News
Blitz Malware: A Tale of Game
Cheats
and Code
Repositories
unit42.paloaltonetworks.com
·
49w
Lost in Resolution:
Azure
OpenAI's
DNS
Resolution Issue
unit42.paloaltonetworks.com
·
49w
How Good Are the LLM
Guardrails
on the Market? A Comparative Study on the
Effectiveness
of LLM Content Filtering Across Major GenAI Platforms
unit42.paloaltonetworks.com
·
49w
Threat
Brief
:
CVE-2025-31324
(Updated May 23)
unit42.paloaltonetworks.com
·
51w
Threat Group Assessment:
Muddled
Libra
(Updated May 16, 2025)
unit42.paloaltonetworks.com
·
52w
DarkCloud
Stealer: Comprehensive Analysis of a New Attack Chain That Employs
AutoIt
unit42.paloaltonetworks.com
·
52w
Stealthy .NET Malware: Hiding Malicious
Payloads
as
Bitmap
Resources
unit42.paloaltonetworks.com
·
53w
·
Hacker News
« Page 6
·
Page 8 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help