unit42.paloaltonetworks.com
Open in
urlscan Pro
92.123.151.6
Public Scan
URL:
https://unit42.paloaltonetworks.com/
Submission: On December 22 via api from BY — Scanned from ES
Submission: On December 22 via api from BY — Scanned from ES
Form analysis
1 forms found in the DOMName: Unit42_Subscribe — POST https://www.paloaltonetworks.com/apps/pan/public/formsubmithandler.submitform.json
<form action="https://www.paloaltonetworks.com/apps/pan/public/formsubmithandler.submitform.json" method="post" novalidate="" class="subscribe-form" name="Unit42_Subscribe" id="unit42footerSubscription_form">
<input type="hidden" name="emailFormMask" value="">
<input type="hidden" value="1086" name="formid">
<input type="hidden" value="531-OCS-018" name="munchkinId">
<input type="hidden" value="2141" name="lpId">
<input type="hidden" value="1203" name="programId">
<input type="hidden" value="1086" name="formVid">
<input type="hidden" name="mkto_optinunit42" value="true">
<input type="hidden" name="mkto_opt-in" value="true">
<div class="form-group">
<label for="newsletter-email" id="newsletter-email-label">Your Email</label>
<input type="emal" placeholder="Your Email" name="Email" class="subscribe-field" id="newsletter-email" aria-labelledby="newsletter-email-label">
<p class="error-mail mb-15 text-danger" style="color: #dc3545"></p>
<p>Subscribe for email updates to all Unit 42 threat research.<br>By submitting this form, you agree to our
<a title="Terms of Use" href="https://www.paloaltonetworks.com/legal-notices/terms-of-use" data-page-track="true" data-page-track-value="Get updates from Unit 42:Terms of Use">Terms of Use</a> and acknowledge our
<a title="Privacy Statement" href="https://www.paloaltonetworks.com/legal-notices/privacy" data-page-track="true" data-page-track-value="Get updates from Unit 42:Privacy Statement">Privacy Statement.</a></p>
<div class="g-recaptcha" data-expired-callback="captchaExpires" data-callback="captchaComplete" data-sitekey="6Lc5EhgTAAAAAJa-DzE7EeWABasWg4LKv-R3ao6o"></div>
<p class="error-recaptcha d-none mt-15 text-danger" style="color: #dc3545">Invalid captcha!</p>
<button class="l-btn is-disabled" data-page-track="true" data-page-track-value="footer:Get updates from Unit 42:Subscribe" id="unit42footerSubscription_form_button"> Subscribe <img class="lozad"
data-src="https://unit42.paloaltonetworks.com/wp-content/themes/unit42-v6/dist/images/icons/right-arrow.svg" alt="Right Arrow">
<img src="https://unit42.paloaltonetworks.com/wp-content/themes/unit42-v6/dist/images/icons/icon-loader.svg" alt="loader" class="loader">
</button>
<div class="form-success-message"></div>
</div>
</form>
Text Content
Menu * Tools * ATOMs * Security Consulting * About Us * Under Attack? * * About Unit 42 * Services Services Assess and Test Your Security Controls * AI Security Assessment * Attack Surface Assessment * Breach Readiness Review * BEC Readiness Assessment * Cloud Security Assessment * Compromise Assessment * Cyber Risk Assessment * M&A Cyber Due Diligence * Penetration Testing * Purple Team Exercises * Ransomware Readiness Assessment * SOC Assessment * Supply Chain Risk Assessment * Tabletop Exercises * Unit 42 Retainer Transform Your Security Strategy * IR Plan Development and Review * Security Program Design * Virtual CISO * Zero Trust Advisory Respond in Record Time * Cloud Incident Response * Digital Forensics * Incident Response * Managed Detection and Response * Managed Threat Hunting * Unit 42 Retainer UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more * Unit 42 Threat Research Unit 42 Threat Research Unit 42 Threat Research * Threat Briefs and Assessments Details on the latest cyber threats * Tools Lists of public tools released by our team * Threat Reports Downloadable, in-depth research reports THREAT REPORT 2024 Unit 42 Incident Response Report Read now THREAT BRIEF Russia-Ukraine Cyberattacks: How to Protect Against Related Cyberthreats Including DDoS, HermeticWiper, Gamaredon, Website Defacement Learn more THREAT REPORT Highlights from the Unit 42 Cloud Threat Report, Volume 6 Learn more * Partners Partners Partners * Threat Intelligence Sharing * Law Firms and Insurance Providers THREAT REPORT 2022 Unit 42 Ransomware Threat Report: Understand trends and tactics to bolster defenses Learn more THREAT BRIEF Russia-Ukraine Cyberattacks: How to Protect Against Related Cyberthreats Including DDoS, HermeticWiper, Gamaredon, Website Defacement Learn more THREAT BRIEF Operation Falcon II: Unit 42 Helps Interpol Identify Nigerian Business Email Compromise Ring Members Learn more * Resources Resources Resources * Research Reports * Webinars * Customer Stories * Datasheets * Videos * Infographics * Whitepapers * Cyberpedia Industries * Financial Services * Healthcare * Manufacturing ANALYST REPORT Unit 42® has been named a Leader in “The Forrester Wave™: Cybersecurity Incident Response Services, Q2 2024.” Read the Forrester report to learn why. Get the report THREAT REPORT Unit 42 Threat Frontier Report: Discover the latest insights on how threat actors are leveraging GenAI to exploit vulnerabilities — and learn what steps you can take to protect yourself. Get the report * * Under Attack? Search All * Tech Docs Close search modal CRITICAL THREAT Threat Research December 20, 2024 NOW YOU SEE ME, NOW YOU DON’T: USING LLMS TO OBFUSCATE MALICIOUS JAVASCRIPT This article demonstrates how AI can be used to modify and help detect JavaScript malware. We boosted our detection rates 10% with retraining. Algorithm Overview and More Threat Research December 20, 2024 NOW YOU SEE ME, NOW YOU DON’T: USING LLMS TO OBFUSCATE MALICIOUS JAVASCRIPT Threat Research December 18, 2024 EFFECTIVE PHISHING CAMPAIGN TARGETING EUROPEAN COMPANIES AND ORGANIZATIONS Threat Research December 17, 2024 LDAP ENUMERATION: UNVEILING THE DOUBLE-EDGED SWORD OF ACTIVE DIRECTORY Threat Research * Threat Research * High Profile Threats * Learning Hub * Threat Actor Groups * Trend Reports ACCESS THE LATEST THREAT RESEARCH View all research Cloud Cybersecurity Research December 16, 2024 DIRTY DAG: NEW VULNERABILITIES IN AZURE DATA FACTORY’S APACHE AIRFLOW INTEGRATION * Microsoft Azure * Container Read now Malware December 13, 2024 CRYPTED HEARTS: EXPOSING THE HEARTCRYPT PACKER-AS-A-SERVICE OPERATION * Redline infostealer * Lumma Stealer * Remcos Read now Malware December 6, 2024 NETWORK ABUSES LEVERAGING HIGH-PROFILE EVENTS: SUSPICIOUS DOMAIN REGISTRATIONS AND OTHER SCAMS * Network scanning * Cybersquatting * ChatGPT Read now UNDERSTAND HIGH PROFILE CYBERTHREATS AND VULNERABILITIES View high profile threats High Profile Threats November 22, 2024 THREAT BRIEF: OPERATION LUNAR PEEK, ACTIVITY RELATED TO CVE-2024-0012 AND CVE-2024-9474 (UPDATED NOV. 22) We detail the observed limited activity regarding authentication bypass vulnerability CVE-2024-0012 affecting specific versions of PAN-OS software, and include protections and mitigations. Read now Ransomware December 2, 2024 THREAT ASSESSMENT: HOWLING SCORPIUS (AKIRA RANSOMWARE) * Howling Scorpius * Leak site * Torrenting Read now Vulnerabilities November 22, 2024 THREAT BRIEF: OPERATION LUNAR PEEK, ACTIVITY RELATED TO CVE-2024-0012 AND CVE-2024-9474 (UPDATED NOV. 22) * PAN-OS Read now Ransomware November 20, 2024 THREAT ASSESSMENT: IGNOBLE SCORPIUS, DISTRIBUTORS OF BLACKSUIT RANSOMWARE * BlackSuit ransomware * Construction * Education Read now Ransomware October 10, 2024 LYNX RANSOMWARE: A REBRANDING OF INC RANSOMWARE * Leak site * Double extortion Read now Ransomware September 10, 2024 THREAT ASSESSMENT: REPELLENT SCORPIUS, DISTRIBUTORS OF CICADA3301 RANSOMWARE * RaaS * Data exfiltration * Leak site Read now Malware September 9, 2024 THREAT ASSESSMENT: NORTH KOREAN THREAT GROUPS * North Korea * Remote Access Trojan * Finance Read now WATCH, LISTEN AND LEARN ABOUT CYBERSECURITY TOPICS View All Previous Malware February 2, 2024 EXPLORING THE LATEST MISPADU STEALER VARIANT Learn more Vulnerabilities January 1, 2024 THREAT VECTOR PODCAST Learn more Cybersecurity Tutorials October 10, 2023 WIRESHARK TUTORIAL: IDENTIFYING HOSTS AND USERS Learn more Cybersecurity Tutorials September 8, 2023 WIRESHARK TUTORIAL: DISPLAY FILTER EXPRESSIONS Learn more Cybersecurity Tutorials March 1, 2024 WIRESHARK TUTORIAL: EXPORTING OBJECTS FROM A PCAP Learn more Malware February 2, 2024 EXPLORING THE LATEST MISPADU STEALER VARIANT Learn more Vulnerabilities January 1, 2024 THREAT VECTOR PODCAST Learn more Cybersecurity Tutorials October 10, 2023 WIRESHARK TUTORIAL: IDENTIFYING HOSTS AND USERS Learn more Cybersecurity Tutorials September 8, 2023 WIRESHARK TUTORIAL: DISPLAY FILTER EXPRESSIONS Learn more Cybersecurity Tutorials March 1, 2024 WIRESHARK TUTORIAL: EXPORTING OBJECTS FROM A PCAP Learn more Malware February 2, 2024 EXPLORING THE LATEST MISPADU STEALER VARIANT Learn more Vulnerabilities January 1, 2024 THREAT VECTOR PODCAST Learn more Cybersecurity Tutorials October 10, 2023 WIRESHARK TUTORIAL: IDENTIFYING HOSTS AND USERS Learn more Cybersecurity Tutorials September 8, 2023 WIRESHARK TUTORIAL: DISPLAY FILTER EXPRESSIONS Learn more Next * 1 * 2 * 3 * 4 * 5 FOLLOW THE ACTIVITIES OF THREAT ACTOR GROUPS TRACKED BY UNIT 42 All threat actor posts Cybercrime June 27, 2024 THREAT ACTOR GROUPS TRACKED BY PALO ALTO NETWORKS UNIT 42 A comprehensive list of threat actor groups tracked by Unit 42, along with information such as summaries and industries typically impacted. Read now Ransomware November 20, 2024 THREAT ASSESSMENT: IGNOBLE SCORPIUS, DISTRIBUTORS OF BLACKSUIT RANSOMWARE * BlackSuit ransomware * Construction * Education Read now Business Email Compromise November 14, 2024 FAKE NORTH KOREAN IT WORKER LINKED TO BEAVERTAIL VIDEO CONFERENCE APP PHISHING ATTACK * North Korea * Lazarus * BeaverTail Read now Cybercrime November 7, 2024 SILENT SKIMMER GETS LOUD (AGAIN) * Remote Code Execution * Python * Reverse shells Read now Ransomware October 30, 2024 JUMPY PISCES ENGAGES IN PLAY RANSOMWARE * North Korea * Jumpy Pisces * Fiddling Scorpius Read now Malware October 9, 2024 CONTAGIOUS INTERVIEW: DPRK THREAT ACTORS LURE TECH INDUSTRY JOB SEEKERS TO INSTALL NEW VARIANTS OF BEAVERTAIL AND INVISIBLEFERRET MALWARE * North Korea * Social engineering * Python Read now Malware September 26, 2024 UNRAVELING SPARKLING PISCES’S TOOL SET: KLOGEXE AND FPSPY * MITRE * Keylogger * North Korea Read now EXPLORE IN-DEPTH CYBERSECURITY TREND REPORTS View All Report THE UNIT 42 THREAT FRONTIER: PREPARE FOR EMERGING AI RISKS Strengthen your grasp of generative AI (GenAI) and learn how attackers can go about compromising GenAI tools to support their efforts. Identify critical capabilities * Learn why conventional cybersecurity tactics are still relevant when defending against AI-enabled attackers. Real examples * We describe how Unit 42 red teams are using AI in our proactive security engagements. Extend your current understanding to the likely future and keep up with, or perhaps even outpace, attackers using AI. Get the report Security Technology October 16, 2024 UNIT 42 LOOKS TOWARD THE THREAT FRONTIER: PREPARING FOR EMERGING AI RISKS * GenAI Read now Security Technology August 14, 2024 UNIT 42 ATTACK SURFACE THREAT RESEARCH: OVER 23% OF INTERNET-CONNECTED EXPOSURES INVOLVE CRITICAL IT AND SECURITY INFRASTRUCTURE * Attack analysis * Media * Attack surface management Read now Ransomware August 9, 2024 RANSOMWARE REVIEW: FIRST HALF OF 2024 * Healthcare * LockBit * RansomHub Read now Cloud Cybersecurity Research June 18, 2024 ATTACK PATHS INTO VMS IN THE CLOUD * AWS * IaaS * Virtual machines Read now FOLLOW UNIT 42 FOR BREAKING THREAT INTELLIGENCE * * * * Get updates from Unit 42 PEACE OF MIND COMES FROM STAYING AHEAD OF THREATS. CONTACT US TODAY. Your Email Subscribe for email updates to all Unit 42 threat research. By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Invalid captcha! Subscribe PRODUCTS AND SERVICES * Network Security Platform * CLOUD DELIVERED SECURITY SERVICES * Advanced Threat Prevention * DNS Security * Data Loss Prevention * IoT Security * Next-Generation Firewalls * Hardware Firewalls * Strata Cloud Manager * SECURE ACCESS SERVICE EDGE * Prisma Access * Prisma SD-WAN * Autonomous Digital Experience Management * Cloud Access Security Broker * Zero Trust Network Access * Code to Cloud Platform * Prisma Cloud * Cloud-Native Application Protection Platform * AI-Driven Security Operations Platform * Cortex XDR * Cortex XSOAR * Cortex Xpanse * Cortex XSIAM * External Attack Surface Protection * Security Automation * Threat Prevention, Detection & Response * Threat Intel and Incident Response Services * Proactive Assessments * Incident Response * Transform Your Security Strategy * Discover Threat Intelligence COMPANY * About Us * Careers * Contact Us * Corporate Responsibility * Customers * Investor Relations * Location * Newsroom POPULAR LINKS * Blog * Communities * Content Library * Cyberpedia * Event Center * Manage Email Preferences * Products A-Z * Product Certifications * Report a Vulnerability * Sitemap * Tech Docs * Unit 42 * Do Not Sell or Share My Personal Information * Privacy * Trust Center * Terms of Use * Documents Copyright © 2024 Palo Alto Networks. All Rights Reserved * * * * * EN * Select your language * USA (ENGLISH) * JAPAN (日本語) Your browser does not support the video tag. DEFAULT HEADING Read the article Seekbar Volume This site uses cookies essential to its operation, for analytics, and for personalized content and ads. Please read our privacy statement for more information.Privacy statement Cookies Settings Reject All Accept All Your Opt Out Preference Signal is Honored PRIVACY PREFERENCE CENTER When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information on cookie consent Allow All MANAGE YOUR CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Back Button COOKIE LIST Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Reject All Confirm My Choices