Unit 42 Palo Alto Networks
- Threat Brief: MongoDB Vulnerability (CVE-2025-14847)by Unit 42 on January 13, 2026 at 8:30 pm
Database platform MongoDB disclosed CVE-2025-14847, called MongoBleed. This is an unauthenticated memory disclosure vulnerability with a CVSS score of 8.7. The post Threat Brief: MongoDB Vulnerability (CVE-2025-14847) appeared first on Unit 42.
- Remote Code Execution With Modern AI/ML Formats and Librariesby Curtis Carmony on January 13, 2026 at 11:00 am
We identified remote code execution vulnerabilities in open-source AI/ML libraries published by Apple, Salesforce and NVIDIA. The post Remote Code Execution With Modern AI/ML Formats and Libraries appeared first on Unit 42.
- Securing Vibe Coding Tools: Scaling Productivity Without Scaling Riskby Kate Middagh and Michael Spisak on January 8, 2026 at 11:00 am
AI-generated code looks flawless until it isn’t. Unit 42 breaks down how to expose these invisible flaws before they turn into your next breach. The post Securing Vibe Coding Tools: Scaling Productivity Without Scaling Risk appeared first on Unit 42.
- VVS Discord Stealer Using Pyarmor for Obfuscation and Detection Evasionby Pranay Kumar Chhaparwal and Lee Wei Yeong on January 2, 2026 at 11:00 am
VVS stealer (or VVS $tealer) is a Python-based infostealer targeting Discord users. It employs Pyarmor for obfuscation, contributing to its efficacy. The post VVS Discord Stealer Using Pyarmor for Obfuscation and Detection Evasion appeared first on Unit 42.
- Who Does Cybersecurity Need? You!by Samantha Stallings on December 24, 2025 at 12:00 am
Cybersecurity thrives on diverse skills, not just coding and engineering. From writers to designers, there’s a place for you in this field. The post Who Does Cybersecurity Need? You! appeared first on Unit 42.
- From Linear to Complex: An Upgrade in RansomHouse Encryptionby Anmol Maurya and Jingwen Shi on December 17, 2025 at 11:00 am
Operators behind RansomHouse, a ransomware-as-a-service (RaaS) group, have upgraded their encryption methods from single-phase to complex and layered. The post From Linear to Complex: An Upgrade in RansomHouse Encryption appeared first on Unit 42.
- Stay Secure: Why Cyber Hygiene Should Be Part of Your Personal Hygieneby Ria Bhatia on December 17, 2025 at 12:00 am
Cyber hygiene is just as vital as personal hygiene. Unit 42 shares tips for people of all experience levels to keep their digital lives secure. The post Stay Secure: Why Cyber Hygiene Should Be Part of Your Personal Hygiene appeared first on Unit 42.
- Exploitation of Critical Vulnerability in React Server Components (Updated December 12)by Unit 42 on December 12, 2025 at 9:40 pm
We discuss the CVSS 10.0-rated RCE vulnerability in the Flight protocol used by React Server Components. This is tracked as CVE-2025-55182. The post Exploitation of Critical Vulnerability in React Server Components (Updated December 12) appeared first on Unit 42.
- Hamas-Affiliated Ashen Lepus Targets Middle Eastern Diplomatic Entities With New AshTag Malware Suiteby Unit 42 on December 11, 2025 at 11:00 am
Hamas-affiliated threat actor Ashen Lepus (aka WIRTE) is conducting espionage with its new AshTag malware suite against Middle Eastern government entities. The post Hamas-Affiliated Ashen Lepus Targets Middle Eastern Diplomatic Entities With New AshTag Malware Suite appeared first on Unit 42.
- 01flip: Multi-Platform Ransomware Written in Rustby Hiroaki Hara on December 10, 2025 at 11:00 am
01flip is a new ransomware family fully written in Rust. Activity linked to 01flip points to alleged dark web data leaks. The post 01flip: Multi-Platform Ransomware Written in Rust appeared first on Unit 42.
- New Prompt Injection Attack Vectors Through MCP Samplingby Yongzhe Huang, Akshata Rao, Changjiang Li, Yang Ji and Wenjun Hu on December 5, 2025 at 11:00 pm
Model Context Protocol connects LLM apps to external data sources or tools. We examine its security implications through various attack vectors. The post New Prompt Injection Attack Vectors Through MCP Sampling appeared first on Unit 42.
- The Browser Defense Playbook: Stopping the Attacks That Start on Your Screenby Unit 42 on December 3, 2025 at 12:00 am
85% of daily work occurs in the browser. Unit 42 outlines key security controls and strategies to make sure yours is secure. The post The Browser Defense Playbook: Stopping the Attacks That Start on Your Screen appeared first on Unit 42.
- The Golden Scale: ‘Tis the Season for Unwanted Giftsby Matt Brady on November 26, 2025 at 11:00 am
Unit 42 shares further updates of cybercrime group Scattered LAPSUS$ Hunters. Secure your organization this holiday season. The post The Golden Scale: ‘Tis the Season for Unwanted Gifts appeared first on Unit 42.
- “Shai-Hulud” Worm Compromises npm Ecosystem in Supply Chain Attack (Updated November 26)by Unit 42 on November 25, 2025 at 4:00 pm
Self-replicating worm “Shai-Hulud” has compromised hundreds of software packages in a supply chain attack targeting the npm ecosystem. We discuss scope and more. The post “Shai-Hulud” Worm Compromises npm Ecosystem in Supply Chain Attack (Updated November 26) appeared first on Unit 42.
- The Dual-Use Dilemma of AI: Malicious LLMsby Unit 42 on November 25, 2025 at 11:00 am
The line between research tool and threat creation engine is thin. We examine the capabilities of WormGPT 4 and KawaiiGPT, two malicious LLMs. The post The Dual-Use Dilemma of AI: Malicious LLMs appeared first on Unit 42.



















