Unit 42 Palo Alto Networks
- Bring the Fight to the Edge: Turning Time Into an Advantage in OT Securityby Adam Robbie on February 24, 2026 at 2:00 pm
Unit 42 research reveals most OT attacks begin in IT. Learn how edge-driven defense stops threats early and turns dwell time into advantage. The post Bring the Fight to the Edge: Turning Time Into an Advantage in OT Security appeared first on Unit 42.
- VShell and SparkRAT Observed in Exploitation of BeyondTrust Critical Vulnerability (CVE-2026-1731)by Justin Moore on February 19, 2026 at 11:00 pm
CVE-2026-1731 is an RCE vulnerability in identity platform BeyondTrust. This flaw allows attackers control of systems without login credentials. The post VShell and SparkRAT Observed in Exploitation of BeyondTrust Critical Vulnerability (CVE-2026-1731) appeared first on Unit 42.
- Critical Vulnerabilities in Ivanti EPMM Exploitedby Justin Moore on February 17, 2026 at 8:35 pm
We discuss widespread exploitation of Ivanti EPMM zero-day vulns CVE-2026-1281 and CVE-2026-1340. Attackers are deploying web shells and backdoors. The post Critical Vulnerabilities in Ivanti EPMM Exploited appeared first on Unit 42.
- Phishing on the Edge of the Web and Mobile Using QR Codesby Diva-Oriane Marty, Shehroze Farooqi and Alex Starov on February 13, 2026 at 11:00 pm
We discuss the extensive use of malicious QR codes using URL shorteners, in-app deep links and direct APK downloads to bypass mobile security. The post Phishing on the Edge of the Web and Mobile Using QR Codes appeared first on Unit 42.
- Nation-State Actors Exploit Notepad++ Supply Chainby Justin Moore on February 11, 2026 at 11:00 pm
Unit 42 reveals new infrastructure associated with the Notepad++ attack. This expands understanding of threat actor operations and malware delivery. The post Nation-State Actors Exploit Notepad++ Supply Chain appeared first on Unit 42.
- A Peek Into Muddled Libra’s Operational Playbookby Justin De Luna, Noah Rincon and Cuong Dinh on February 10, 2026 at 11:00 pm
Explore the tools Unit 42 found on a Muddled Libra rogue host. Learn how they target domain controllers and use search engines to aid their attacks. The post A Peek Into Muddled Libra’s Operational Playbook appeared first on Unit 42.
- Novel Technique to Detect Cloud Threat Actor Operationsby Nathaniel Quist on February 6, 2026 at 11:00 pm
We introduce a novel method that maps cloud alert trends to MITRE ATT&CK techniques. The patterns created could identify threat actors by behavior. The post Novel Technique to Detect Cloud Threat Actor Operations appeared first on Unit 42.
- The Shadow Campaigns: Uncovering Global Espionageby Unit 42 on February 5, 2026 at 11:00 am
In 2025 a threat group compromised government and critical infrastructure in 37 countries, with reconnaissance in 155. The post The Shadow Campaigns: Uncovering Global Espionage appeared first on Unit 42.
- Why Smart People Fall For Phishing Attacksby Ria Bhatia on February 4, 2026 at 12:00 am
Why do successful phishing attacks target our psychology rather than just our software? Discover Unit 42’s latest insights on defeating social engineering and securing your digital life. The post Why Smart People Fall For Phishing Attacks appeared first on Unit 42.
- Privileged File System Vulnerability Present in a SCADA Systemby Asher Davila and Malav Vyas on January 30, 2026 at 11:00 pm
We detail our discovery of CVE-2025-0921. This privileged file system flaw in SCADA system Iconics Suite could lead to a denial-of-service (DoS) attack. The post Privileged File System Vulnerability Present in a SCADA System appeared first on Unit 42.
- Understanding the Russian Cyberthreat to the 2026 Winter Olympicsby Justin Moore on January 29, 2026 at 9:30 pm
Russia’s current isolation from the Olympics may lead to increased cyberthreats targeting the 2026 Winter Games. We discuss the potential threat picture. The post Understanding the Russian Cyberthreat to the 2026 Winter Olympics appeared first on Unit 42.
- Happy 9th Anniversary, CTA: A Celebration of Collaboration in Cyber Defenseby Kathi Whitbey on January 24, 2026 at 12:00 am
Unit 42 celebrates 9 years of the Cyber Threat Alliance, tracing its journey from a bold idea to a global leader in collaborative cyber defense. The post Happy 9th Anniversary, CTA: A Celebration of Collaboration in Cyber Defense appeared first on Unit 42.
- The Next Frontier of Runtime Assembly Attacks: Leveraging LLMs to Generate Phishing JavaScript in Real Timeby Shehroze Farooqi, Alex Starov, Diva-Oriane Marty and Billy Melicher on January 22, 2026 at 11:00 am
We discuss a novel AI-augmented attack method where malicious webpages use LLM services to generate dynamic code in real-time within a browser. The post The Next Frontier of Runtime Assembly Attacks: Leveraging LLMs to Generate Phishing JavaScript in Real Time appeared first on Unit 42.
- DNS OverDoS: Are Private Endpoints Too Private?by Golan Myers on January 20, 2026 at 5:23 pm
We’ve identified an aspect of Azure’s Private Endpoint architecture that could expose Azure resources to denial of service (DoS) attacks. The post DNS OverDoS: Are Private Endpoints Too Private? appeared first on Unit 42.
- Anatomy of an Attack: The Payroll Pirates and the Power of Social Engineeringby Randy Stone on January 17, 2026 at 12:00 am
Unit 42 breaks down a payroll attack fueled by social engineering. Learn how the breach happened and how to protect your organization from similar threats. The post Anatomy of an Attack: The Payroll Pirates and the Power of Social Engineering appeared first on Unit 42.





















