{"id":14695,"date":"2016-06-16T05:00:11","date_gmt":"2016-06-16T12:00:11","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=14695"},"modified":"2016-06-15T15:41:33","modified_gmt":"2016-06-15T22:41:33","slug":"want-to-be-among-the-first-to-receive-new-threat-intelligence-from-unit-42","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2016\/06\/want-to-be-among-the-first-to-receive-new-threat-intelligence-from-unit-42\/","title":{"rendered":"Want to be Among the First to Receive New Threat Intelligence from Unit 42?"},"content":{"rendered":"<p class=\"p1\"><span class=\"s1\">You can have the latest Unit 42 insights, research and threat intelligence delivered right to your inbox!<\/span><\/p>\n<p class=\"p1\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/Unit-42-banner-1.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:13.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-14586 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/Unit-42-banner-1-500x68.png\" alt=\"Unit-42-banner-1\" width=\"500\" height=\"68\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/Unit-42-banner-1.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/Unit-42-banner-1-230x31.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/Unit-42-banner-1-240x33.png 240w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p class=\"p1\"><span class=\"s1\">Head to the <a href=\"https:\/\/www.paloaltonetworks.com\/threat-research.html\" target=\"_blank\"><span class=\"s2\">Unit 42 homepage<\/span><\/a> and enter your e-mail in the \u201cGet Updates\u201d box to receive news from our threat intelligence team as it happens, as well as get the latest information on upcoming Unit 42 whitepapers and appearances at industry events.<\/span><!--more--><\/p>\n<h3 class=\"p1\"><span class=\"s1\">To learn more<\/span><\/h3>\n<ul>\n<li class=\"p1\"><span class=\"s1\"><a href=\"https:\/\/www.paloaltonetworks.com\/threat-research.html\" target=\"_blank\"><span class=\"s2\">Visit the Unit 42 home page<\/span><\/a>\u00a0<\/span><\/li>\n<li class=\"p1\"><span class=\"s1\">Read the team\u2019s research and analysis on the <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/unit42\/\" target=\"_blank\"><span class=\"s2\">Unit 42 threat intelligence blog<\/span><\/a> including these recent posts:<\/span>\n<ul>\n<li class=\"p1\"><span class=\"s5\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/06\/unit42-new-sofacy-attacks-against-us-government-agency\/\" target=\"_blank\"><span class=\"s6\">New Sofacy Attacks Against US Government Agency<\/span><\/a><\/span><\/li>\n<li class=\"p2\"><span class=\"s5\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/06\/unit42-using-idapython-to-make-your-life-easier-part-6\/\" target=\"_blank\"><span class=\"s6\">Using IDAPython to Make Your Life Easier: Part 6<\/span><\/a><\/span><\/li>\n<li class=\"p1\"><span class=\"s1\">Understanding Angler Exploit Kit, <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/06\/unit42-understanding-angler-exploit-kit-part-1-exploit-kit-fundamentals\/\" target=\"_blank\"><span class=\"s2\">Part 1: Exploit Kit Fundamentals<\/span><\/a> and<b> <\/b><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/06\/unit42-understanding-angler-exploit-kit-part-2-examining-angler-ek\/\" target=\"_blank\"><span class=\"s2\">Part 2: Examining Angler EK<\/span><\/a><\/span><\/li>\n<li class=\"p2\"><span class=\"s5\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/05\/the-oilrig-campaign-attacks-on-saudi-arabian-organizations-deliver-helminth-backdoor\/\" target=\"_blank\"><span class=\"s6\">The OilRig Campaign: Attacks on Saudi Arabian Organizations Deliver Helminth Backdoor<\/span><\/a><\/span><\/li>\n<li class=\"p2\"><span class=\"s5\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/05\/unit42-new-wekby-attacks-use-dns-requests-as-command-and-control-mechanism\/\" target=\"_blank\"><span class=\"s6\">New Wekby Attacks Use DNS Requests As Command and Control Mechanism<\/span><\/a><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>You can have the latest Unit 42 insights, research and threat intelligence delivered right to your inbox! Head to the Unit 42 homepage and enter your e-mail in the \u201cGet Updates\u201d box &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155],"tags":[443,922],"coauthors":[709],"class_list":["post-14695","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","tag-research","tag-threat-intelligence"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/14695","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=14695"}],"version-history":[{"count":4,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/14695\/revisions"}],"predecessor-version":[{"id":14707,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/14695\/revisions\/14707"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=14695"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=14695"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=14695"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=14695"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}