“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, consulting, engineering and more. Our objective is to present different viewpoints and predictions on how artificial intelligence is impacting the current...
“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, consulting, engineering and more....
“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42 with roles in AI research, product management, consu...
“AI’s Impact in Cybersecurity” is a regular blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42 with roles in AI research, product management, consulting, engineering and more. Our obje...
“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42 with roles in AI research, product management, consu...
It’s not clear who first uttered the quip: Of course, I can keep a secret. It's the people I tell it to that can't. But what’s clear is that there are plenty of times when it’s a m...
In today's digital landscape, organizations heavily rely on a suite of productivity applications, like Microsoft 365 and Google Suite for their day-to...
The concern over securing electrical grids from advanced attacks deployed by various threat actors, such as nation-states and well-resourced cybercriminals, is increasing. Creating...
Welcome to the Nov-Dec 2023 edition of Always Innovating in Network Security from Palo Alto Networks. We have had a busy couple of months and as we enter the holidays, we bring you...
Good news is here for cloud and network security professionals who need proven, cost-effective solutions that substantially reduce downtime and breaches across a range of cloud and...
Earlier this year, Palo Alto Networks launched Zero Trust OT Security, a solution to help industrial asset owners and operators keep their operational...
Palo Alto Networks is the leading vendor in preventing Cobalt Strike C2 communication. According to the recently published report by SecureIQlab, Palo Alto Networks is the only lea...
As enterprises have moved their data assets to the cloud, they depend on SaaS applications to conduct their business. Today, SaaS apps have evolved to become highly customizable, increasing the risk of misconfi...
Today’s large, distributed enterprises face an enormous challenge navigating the complex compliance requirements for safeguarding sensitive informatio...
In the rapidly evolving landscape of enterprise technology, the adoption of cutting-edge solutions, like secure access service edge (SASE), is no longer a luxury but a necessity. P...
In the dynamic landscape of network security, organizations grapple with the challenge of fortifying their digital infrastructure while staying ahead of the innovations. The synerg...
Modern enterprises face an increasingly complex challenge: the distributed workforce relies on high-performance apps, but enterprises can’t guarantee a consistent app experience fo...
The integration of OpenAI's Custom GPTs with personal data files and third-party APIs offers new opportunities for organizations looking for custom LLMs for a variety of needs. The...
Many organizations struggle to determine their data’s precise locations and pathways, making it challenging to ensure security and compliance througho...
A recent discovery identifies critical vulnerabilities affecting Docker and other container engines. Collectively called "Leaky Vessels", the vulnerab...
Prisma Cloud takes the next step in working toward Federal Risk and Authorization Management Program (FedRAMP) High authorization and has achieved the "in process" milestone on the FedRAMP Marketplace.
On December 7, 2023, Apache released an advisory regarding CVE-2023-50164, a critical vulnerability with a severity of 9.8 that affects Apache Struts...
Shadow data is inevitable, particularly with the shift to cloud and data democratization. The ease of creating shadow data assets and the potential for faster insights incentivize...
A lot goes into getting cloud security right. Comprehensive, contextual visibility and control are necessary for maintaining security posture. Code security must seamlessly integra...
“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, cons...
In this blog post we will explain how attackers use direct syscalls to overcome most EDR solutions, by first discussing the conventional Windows syscall flow and how most EDR solut...
In the landscape of cybersecurity, the emergence of artificial intelligence (AI) stands as a transformative force used by both defenders and attackers. Its integration into cybersecurity practices will redefine our approach,...
“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, cons...
Insidious Taurus, aka Volt Typhoon, is a nation-state TA attributed to the People's Republic of China. We provide an overview of their current activity and miti...
Analysis of ransomware gang leak site data reveals significant activity over 2023. As groups formed — or dissolved — and tactics changed, we synthesize our ...
A network of over 130k domains was part of a campaign to deliver shareware, PUPs and other scams. We unravel the threads of this campaign from entry point to pa...
We analyze the extremely active ransomware group BianLian. Mostly targeting healthcare, they have moved from double-extortion to extortion without encryption....
Traffic detection system Parrot has infected tens of thousands of websites worldwide. We outline the scripting evolution of this injection campaign and its scop...
Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.