Unit 42 - Latest Cyber Security Research | Palo Alto Networks
We detail the observed limited activity regarding authentication bypass vulnerability CVE-2024-0012 affecting specific versions of PAN-OS software, and include protections and mitigations.
Details and More High Profile Threats November 22, 2024Threat Brief: Operation Lunar Peek, Activity Related to CVE-2024-0012 and CVE-2024-9474 (Updated Nov. 22)
Threat Research November 22, 2024Lateral Movement on macOS: Unique and Popular Techniques and In-the-Wild Examples
High Profile Threats November 20, 2024Threat Assessment: Ignoble Scorpius, Distributors of BlackSuit Ransomware
Threat Research- Threat Research
- High Profile Threats
- Learning Hub
- Threat Actor Groups
- Trend Reports
Access the latest threat research
View all research Malware November 19, 2024FrostyGoop’s Zoom-In: A Closer Look into the Malware Artifacts, Behaviors and Network Communications
- BUSTLEBERM
- FrostyGoop
- Go
Fake North Korean IT Worker Linked to BeaverTail Video Conference App Phishing Attack
- North Korea
- Lazarus
- BeaverTail
Global Companies Are Unknowingly Paying North Koreans: Here’s How to Catch Them
- Advanced Persistent Threat
- DPRK
- North Korea
Understand high profile cyberthreats and vulnerabilities
View high profile threats High Profile Threats November 22, 2024Threat Brief: Operation Lunar Peek, Activity Related to CVE-2024-0012 and CVE-2024-9474 (Updated Nov. 22)
We detail the observed limited activity regarding authentication bypass vulnerability CVE-2024-0012 affecting specific versions of PAN-OS software, and include protections and mitigations.
Read now Ransomware October 10, 2024Lynx Ransomware: A Rebranding of INC Ransomware
- Leak site
- Double extortion
Threat Assessment: Repellent Scorpius, Distributors of Cicada3301 Ransomware
- RaaS
- Data exfiltration
- Leak site
Threat Assessment: North Korean Threat Groups
- North Korea
- Remote Access Trojan
- Finance
Threat Brief: CVE-2024-6387 OpenSSH RegreSSHion Vulnerability
- OpenSSH
- Remote Code Execution
- SSH
Threat Brief: Operation MidnightEclipse, Post-Exploitation Activity Related to CVE-2024-3400 (Updated May 20)
- MidnightEclipse
- CVE-2024-3400
- Upstyle
Muddled Libra’s Evolution to the Cloud
- Microsoft Azure
- Muddled Libra
Watch, listen and learn about cybersecurity topics
View All Cybersecurity Tutorials March 1, 2024Wireshark Tutorial: Exporting Objects From a Pcap
Learn more Malware February 2, 2024Exploring the Latest Mispadu Stealer Variant
Learn more Vulnerabilities January 1, 2024Threat Vector Podcast
Learn more Cybersecurity Tutorials October 10, 2023Wireshark Tutorial: Identifying Hosts and Users
Learn more Cybersecurity Tutorials September 8, 2023Wireshark Tutorial: Display Filter Expressions
Learn moreFollow the activities of threat actor groups tracked by Unit 42
All threat actor posts Cybercrime June 27, 2024Threat Actor Groups Tracked by Palo Alto Networks Unit 42
A comprehensive list of threat actor groups tracked by Unit 42, along with information such as summaries and industries typically impacted.
Read now Business Email Compromise November 14, 2024Fake North Korean IT Worker Linked to BeaverTail Video Conference App Phishing Attack
- North Korea
- Lazarus
- BeaverTail
Silent Skimmer Gets Loud (Again)
- Remote Code Execution
- Python
- Reverse shells
Jumpy Pisces Engages in Play Ransomware
- North Korea
- Jumpy Pisces
- Fiddling Scorpius
Contagious Interview: DPRK Threat Actors Lure Tech Industry Job Seekers to Install New Variants of BeaverTail and InvisibleFerret Malware
- North Korea
- Social engineering
- Python
Unraveling Sparkling Pisces’s Tool Set: KLogEXE and FPSpy
- MITRE
- Keylogger
- North Korea
Gleaming Pisces Poisoned Python Packages Campaign Delivers PondRAT Linux and MacOS Backdoors
- Python
- Cryptocurrency
- North Korea
Explore in-depth cybersecurity trend reports
View All ReportUpdated: 2024 Unit 42 Incident Response Report
Access our survey of incident data from more than 250 organizations and 600 incidents, updated for summer 2024. You’ll better understand the threats you face, including:
Initial access
- Attackers exploited software vulnerabilities to gain access 36% more often in 2023 than previous years… and that trend is continuing in 2024.
Data theft tactics
- In 93% of incidents Unit 42 responded to, threat actors took data indiscriminately rather than searching for specific data.
Plus updated spotlights on attackers, artificial intelligence, predictions (and how we’re doing against them), and more.
Get the report Security Technology October 16, 2024Unit 42 Looks Toward the Threat Frontier: Preparing for Emerging AI Risks
- GenAI
Unit 42 Attack Surface Threat Research: Over 23% of Internet-Connected Exposures Involve Critical IT and Security Infrastructure
- Attack analysis
- Media
- Attack surface management
Ransomware Review: First Half of 2024
- Healthcare
- LockBit
- RansomHub
Attack Paths Into VMs in the Cloud
- AWS
- IaaS
- Virtual machines
Follow Unit 42 for breaking threat intelligence
Từ khóa » Nhóm 42
-
Phân Loại Nhóm Hàng Hóa, Dịch Vụ đăng Ký Nhãn Hiệu - Luật Việt An
-
Group 42 (company) - Wikipedia
-
G42: Home2
-
Group 42 Inc - Company Profile And News - Bloomberg Markets
-
Group 42 Holding Ltd - Company Profile And News
-
ÁO NHÓM - 42 - Công Ty May Đồng Phục Thiên Nguyên
-
Group 42 - Crunchbase Investor Profile & Investments
-
Group 42 - Silver Lake
-
Major Group 42: Motor Freight Transportation And Warehousing
-
Definition: Group Practice From 42 USC § 1395nn(h)(4)
-
42 CFR § 418.56 - Condition Of Participation: Interdisciplinary Group ...
-
Digital Workspace Management–Simplify & Secure Digital Work ...
-
[PDF] RHB_Our_Approach_to_Sustain...