Resource Center

Our library of online content is here to help you learn more—no matter what format you prefer or which topic interests you most.

Explore resources

CLEAR

Filters

Results
Displaying 109–126 of 145 Results
In The News

Nigerian Police Arrest 11 Individuals in BEC Crackdown

Explore news coverage
In The News

800,000 Passwords, 50,000 Targets: A Huge Nigerian Fraud Operation Busted

Explore news coverage
In The News

Interpol & Nigerian Police Force Arrest 11 BEC Actors

Explore news coverage
In The News

Interpol arrests 11 alleged members of Nigerian scam syndicate 'SilverTerrier'

Explore news coverage
In The News

Interpol and Nigerian police bust cybercrime BEC ring

Explore news coverage
Webinar

Top Questions Your C-Suite and Board Will Ask About Log4j

Watch the video
Webinar

How Palo Alto Networks Protects Customers From the Apache Log4j Vulnerability

Watch the video
Webinar

Understanding and Responding to the Apache Log4j Vulnerability

Watch the video
asset pdf thumbnail
Datasheet

Unit 42 Security Consulting Overview

Download the datasheet
In The News

Suspected Chinese hackers breach more US defense and tech firms

Explore news coverage
In The News

Hackers use in-house Zoho ServiceDesk exploit to drop webshells

Explore news coverage
Video

A New Optimized Approach to Cloud Incident Response

Watch the video
Video

Intelligence Driven. Response Ready: The New Unit 42

Watch the video
asset pdf thumbnail
Infographic

Infographic: Significant Supply Chain Attacks

Download the infographic
asset pdf thumbnail
Infographic

Infographic: Inside the Complexity of a Cloud Supply Chain

Download the infographic
In The News

Hackers have breached organizations in defense and other sensitive sectors, security firm says

Explore news coverage
asset pdf thumbnail
Services

Public Sector on Demand Subscription

Read the story
asset pdf thumbnail
Research Reports

Unit 42 Cloud Threat Report, Vol. 5

Explore research reports