• Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
  • magnifying glass search icon to open search field
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Partners
  • Company
  • More
  • Sign In
    Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
    Language
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
  • Unit 42 Threat Intelligence

Executive Summary: The State of Cloud Native Security 2022

The Executive Summary for The State of Cloud Native Security 2022 research report offers key insights gleaned from security and DevOps leaders at the forefront of the cloud native ecosystem.
See more

2022 SecureIQLab: Command and Control Comparative Report

The Palo Alto Networks Unit 42 threat research team has observed more than a 73% increase in the use of Red Team tools such as Cobalt Strike by threat actors (Source: Network Threat Trends report, pg. 18).
See more

Date

  • Last week
  • Last 30 days
  • Last 6 months
  • Last year
By Type

By Type

  • Research Reports (129)
  • White Paper (2)
  • Article (1)
  • Infographic (1)
By Topic

By Topic

  • Cloud Security (21)
  • Public Cloud Security (17)
  • Network Security (16)
  • Private Cloud Security (15)
  • Secure Access Service Edge (SASE)  (10)
  • Threat Detection and Prevention (9)
  • Security Operations (8)
  • Google Cloud (4)
  • Microsoft Azure (4)
  • Amazon Web Services (4)
  • Security Operating Platform (4)
  • Zero Trust (3)
  • Security Ecosystem (3)
  • Data Center (3)
  • Network Security Management (2)
  • Secure Remote Workforce (2)
  • Saas Security (1)
  • Mobile Security (1)
  • + Show More
By Industry

By Industry

  • Financial Services (3)
  • Healthcare (2)
  • Federal Government (2)
  • State & Local Government (1)
  • Manufacturing (1)
  • Retail (1)
  • + Show More
By Product Category

By Product Category

  • + Show More
By Features

By Features

  • + Show More
By Technologies

By Technologies

  • + Show More
By Services

By Services

  • Managed Detection & Response (2)
By Audience

By Audience

By Language

By Language

  • English (21)
Displaying 121 - 129 of 129
Pagination
  • 1
  • 2
  • 3
  • 4
  • 5

Research Reports

Credential-Based Attacks Research

Credential-Based Attacks: Exposing the Ecosystem and Motives Behind Credential Phishing, Theft and Abuse In this white paper, Unit 42 details the ecosystem behind how adversaries steal and leverage legitimate credentials to break in and move laterally within the organization, often bypassing security controls. Learn the key attack methods currently in use, how this technique fits into attacker playbooks, and real-world guidance on preventing successful attacks.
Santa ClaraMarch 21, 2017

Research Reports

SILVERTERRIER: The Next Evolution in Nigerian Cybercrime

Unit 42 tracks Nigerian Threat Actors and finds they've evolved into capable and formidable adversaries successfully attacking major companies and governments.
November 3, 2016

Research Reports

Exploit Kits Research

Exploit kits, which first became popular in 2006, are used to automate the exploitation of vulnerabilities on victims’ machines, most commonly while users are browsing the web. Over the past decade they have become an extremely popular means for criminal groups to distribute mass malware or remote access tools (RAT), because they lower the barrier to entry for attackers and can enable opportunistic attacks at scale. To understand this phenomenon, we must understand the ecosystem that surrounds exploit kits, including the actors, campaigns and terminology involved.
October 18, 2016

Research Reports

Cyber Espionage: Behind the Scarlet Mimic

The Palo Alto Networks threat research team, Unit 42, has spent the last seven months investigating a series of attacks, determining that they are the result of a long-standing cyber espionage campaign. The campaign, which we refer to as “Scarlet Mimic,” has activity dating back over four years. The result of our analysis has allowed us to connect a series of disparate attacks into a coherent picture of the Scarlet Mimic operation, which has targeted human rights activists, as well as organizations with knowledge about these groups, including government entities.
January 24, 2016

Research Reports

Real-World Threat & Application Reporting

The AUTR provides visibility into the real-world threat and application landscape, helping security teams to understand how adversaries are attempting to attack organizations around the world and build proactive, actionable controls. Built by the Unit 42 threat research team, the report correlates data from more than 7,000 enterprise organizations, providing broad visibility into critical trends.
Santa ClaraOctober 5, 2015

Research Reports

CoolReaper: The Coolpad Backdoor

CoolReaper: The Coolpad Backdoor New research from Unit 42 confirms security risk in Coolpad devices Palo Alto Networks researchers have uncovered CoolReaper, a backdoor contained in millions of Android devices sold by manufacturer Coolpad. CoolReaper exposes users to potential malicious activity and appears to have been installed and maintained by Coolpad despite objections from customers. Due to the unique way Coolpad modifies the Android OS, it is difficult for Android antivirus programs to identify and remove this backdoor.
Palo Alto Networks, Santa Clara, CADecember 17, 2014

Research Reports

WireLurker: A New Era in iOS and OS X Malware

Read the report about WireLurker and its potential impact, and get recommendations for preventing and mitigating WireLurker and other iOS and OS X malware threats.
Santa Clara, CANovember 5, 2014

Research Reports

419 Evolution

In the past three months Palo Alto Networks has identified a series of attacks emanating from Nigerian actors against our customers in Taiwan and South Korea. Our team is tracking this activity under the code name Silver Spaniel. These attacks have deployed commodity tools that can be purchased for small fees on underground forums and deployed by any individual with a laptop and an e-mail address. Read the report by Palo Alto Networks Unit 42.
July 22, 2014

Research Reports

Webcast: Stopping the Hemorrhaging of Personal Health Information

In the face of government regulation such as the Health Insurance Portability and Accountability Act (HIPAA), personal health information (PHI) continues to leak into the public domain at an alarming rate, resulting in fraudulent insurance claims, identity theft and other costs to the health care industry. Research indicates PHI can easily be found on peer-to-peer (P2P) filesharing networks. But why?
Santa ClaraJuly 22, 2014
Displaying 121 - 129 of 129
Pagination Bottom
  • 1
  • 2
  • 3
  • 4
  • 5

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Products A-Z
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Customers
  • Careers
  • Contact Us
  • Manage Email Preferences
  • Newsroom
  • Product Certifications
Report a Vulnerability
Create an account or login

Copyright © 2023 Palo Alto Networks. All rights reserved