Operation Lotus Blossom

Persistent Cyber Espionage Campaign Targets Southeast Asian Government and Military Networks

It appears that your browser does not support viewing PDF's inline, please click the download button to view it.

Get Updates

Sign up to receive emails with the latest news, research, and reports from Unit 42.

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.


Recommended Resources

What is an Intrusion Prevention System?

An Intrusion Prevention System (IPS) is a network security prevention technology that examines network traffic flow to detect and prevent vulnerability exploits
  • 4
  • 102810

What is a denial of service attack (DoS) ?

A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users by flooding it with traffic.
  • 2
  • 51278

What is Cybersecurity?

Cybersecurity refers to the preventative techniques used to protect the integrity of networks, programs and data from attack, damage, or unauthorized access.
  • 4
  • 78223

Product Summary Specsheet

Key features, performance capacities and specifications for all Palo Alto Networks firewalls.
  • 85
  • 231579

What is a Zero Trust Architecture?

Businesses who want to prevent the exfiltration of sensitive data and improve their defense against modern cyber threats can consider a Zero Trust architecture.
  • 1
  • 35139

What is a Data Center?

A data center is a facility that centralizes an organization’s IT operations and equipment, and where it stores, manages, and disseminates its data
  • 0
  • 43050