{"id":8895,"date":"2015-05-04T05:00:15","date_gmt":"2015-05-04T12:00:15","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=8895"},"modified":"2015-04-30T14:10:11","modified_gmt":"2015-04-30T21:10:11","slug":"dont-miss-the-latest-threat-intelligence-from-unit-42","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2015\/05\/dont-miss-the-latest-threat-intelligence-from-unit-42\/","title":{"rendered":"Don't Miss The Latest Threat Intelligence from Unit 42"},"content":{"rendered":"<p>Unit 42, the Palo Alto Networks threat intelligence team, regularly provides research insights, blog posts and whitepapers addressing the current cyber threat landscape. You can receive updates every time Unit 42 posts new content, as well as receive notifications on new research and appearances by Unit 42 researchers at industry events, by subscribing to Unit 42 alerts in the \"Get Updates\" box <a href=\"https:\/\/www.paloaltonetworks.com\/threat-research.html\" target=\"_blank\">here<\/a>.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:13.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7596 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-500x68.png\" alt=\"blog-title-unit42\" width=\"500\" height=\"68\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-500x68.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-230x31.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-510x69.png 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-240x32.png 240w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42.png 632w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Here are recent research posts from Unit 42:<!--more--><\/p>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/04\/2015-verizon-data-breach-investigations-report-dbir-insights-from-unit-42\/\" target=\"_blank\">2015 Verizon Data Breach Investigations Report (DBIR): Insights from Unit 42<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/04\/unit-42-identifies-new-dragonok-backdoor-malware-deployed-against-japanese-targets\/\" target=\"_blank\">Unit 42 Identifies New DragonOK Backdoor Malware Deployed Against Japanese Targets<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/03\/android-installer-hijacking-vulnerability-could-expose-android-users-to-malware\/\" target=\"_blank\">Android Installer Hijacking Vulnerability Could Expose Android Users to Malware<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/03\/findpos-new-pos-malware-family-discovered\/\" target=\"_blank\">FindPOS<\/a><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/03\/findpos-new-pos-malware-family-discovered\/\" target=\"_blank\">: New POS Malware Family Discovered<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Unit 42, the Palo Alto Networks threat intelligence team, regularly provides research insights, blog posts and whitepapers addressing the current cyber threat landscape. You can receive updates every time Unit 42 posts &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,108],"tags":[1121,1139,1119,922,330],"coauthors":[709],"class_list":["post-8895","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-threat-prevention-2","tag-android-installer-hijacking","tag-dragonok","tag-findpos","tag-threat-intelligence","tag-verizon-data-breach-investigations-report"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8895","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=8895"}],"version-history":[{"count":2,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8895\/revisions"}],"predecessor-version":[{"id":8958,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8895\/revisions\/8958"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=8895"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=8895"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=8895"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=8895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}