Originally from Unit 42: Converging Interests: Analysis of Threat Clusters Targeting a Southeast Asian Government ( :-{ı▓ #unit42 #threathunting #cyberresearch
Originally from Unit 42: Threat Brief: Recruiting Scheme Impersonating Palo Alto Networks Talent Acquisition Team ( :-{ı▓ #unit42 #threathunting #cyberresearch
Stryker confirms a malicious file linked to the March 11 Iran-related Handala attack was found, likely exploiting Microsoft Intune credentials to wipe devices. Restoration underway with help from Unit 42 and US agencies. #Iran #StrykerAttack #Unit42
Originally from Unit 42: Google Authenticator: The Hidden Mechanisms of Passwordless Authentication ( :-{ı▓ #unit42 #threathunting #cyberresearch
Originally from Unit 42: Iranian Cyber Threat Evolution: From MBR Wipers to Identity Weaponization ( :-{ı▓ #unit42 #threathunting #cyberresearch
Originally from Unit 42: Who’s Really Shopping? Retail Fraud in the Age of Agentic AI ( :-{ı▓ #unit42 #threathunting #cyberresearch
Originally from Unit 42: Analyzing the Current State of AI Use in Malware ( :-{ı▓ #unit42 #threathunting #cyberresearch
Originally from Unit 42: Navigating Security Tradeoffs of AI Agents ( :-{ı▓ #unit42 #threathunting #cyberresearch
Originally from Unit 42: Open, Closed and Broken: Prompt Fuzzing Finds LLMs Still Fragile Across Open and Closed Models ( :-{ı▓ #unit42 #threathunting #potatoresearch
Originally from Unit 42: Open, Closed and Broken: Prompt Fuzzing Finds LLMs Still Fragile Across Open and Closed Models ( :-{ı▓ #unit42 #threathunting #cyberresearch
Originally from Unit 42: Boggy Serpens Threat Assessment ( :-{ı▓ #unit42 #threathunting #cyberresearch
Originally from Unit 42: Suspected China-Based Espionage Operation Against Military Targets in Southeast Asia ( :-{ı▓ #unit42 #threathunting #cyberresearch
Originally from Unit 42: Insights: Increased Risk of Wiper Attacks ( :-{ı▓ #unit42 #threathunting #cyberresearch
Originally from Unit 42: Auditing the Gatekeepers: Fuzzing "AI Judges" to Bypass Security Controls ( :-{ı▓ #unit42 #threathunting #cyberresearch
Originally from Unit 42: An Investigation Into Years of Undetected Operations Targeting High-Value Sectors ( :-{ı▓ #unit42 #threathunting #cyberresearch
Originally from Unit 42: Taming Agentic Browsers: Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel ( :-{ı▓ #unit42 #threathunting #cyberresearch
Originally from Unit 42: Fooling AI Agents: Web-Based Indirect Prompt Injection Observed in the Wild ( :-{ı▓ #unit42 #threathunting #cyberresearch
Originally from Unit 42: Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran ( :-{ı▓ #unit42 #threathunting #cyberresearch
Originally from Unit 42: Bring the Fight to the Edge: Turning Time Into an Advantage in OT Security ( :-{ı▓ #unit42 #threathunting #cyberresearch
Originally from Unit 42: VShell and SparkRAT Observed in Exploitation of BeyondTrust Critical Vulnerability (CVE-2026-1731) ( :-{ı▓ #unit42 #threathunting #cyberresearch
Originally from Unit 42: Critical Vulnerabilities in Ivanti EPMM Exploited ( :-{ı▓ #unit42 #threathunting #cyberresearch
Unit 42’s report points to AI being a friction reducer for adversaries. It allows actors to operate with machine-like efficiency. #unit42 #paloaltonetworks #cybersecurity #threatintel #ciso #enterprise #infosec #ai #technology
Originally from Unit 42: Phishing on the Edge of the Web and Mobile Using QR Codes ( :-{ı▓ #unit42 #threathunting #cyberresearch
Originally from Unit 42: Nation-State Actors Exploit Notepad++ Supply Chain ( :-{ı▓ #unit42 #threathunting #cyberresearch
Originally from Unit 42: A Peek Into Muddled Libra’s Operational Playbook ( :-{ı▓ #unit42 #threathunting #cyberresearch
Asian State Group Breaches 70 Gov Entities
Read More: buff.ly/Qf6nBG6
#CyberEspionage #NationStateThreat #APTCampaign #GovernmentNetworks #CriticalInfrastructure #ThreatIntel #GlobalCyber #Unit42
Nieuw onderzoek Palo Alto Networks: wereldwijde cyberspionagecampagne infiltreert kritieke systemen in 37 landen
#Persbericht #Onderzoek #PaloAltoNetworks #Cyberspionage #Unit42
Originally from Unit 42: Novel Technique to Detect Cloud Threat Actor Operations ( :-{ı▓ #unit42 #threathunting #cyberresearch
Originally from Unit 42: The Shadow Campaigns: Uncovering Global Espionage ( :-{ı▓ #unit42 #threathunting #cyberresearch
Originally from Unit 42: Why Smart People Fall For Phishing Attacks ( :-{ı▓ #unit42 #threathunting #cyberresearch