Announcing OpenAI ChatGPT Enterprise Compliance Integration

As modern businesses evolve with today’s digital landscape, artificial intelligence (AI) has emerged as a transformative force, reshaping the way we work and redefining roles across industries. As we stand on the cusp of a new technological revolution, it’s becoming increasingly clear that AI will serve as a catalyst for innovation, efficiency and productivity.

Jul 18, 2024

Corporate Blogs

Announcing OpenAI ChatGPT Enterprise Compliance Integration

Announcing OpenAI ChatGPT Enterprise Compliance Integration

As modern businesses evolve with today’s digital landscape, artificial intelligence (AI) has emerged as a transformative force, reshaping the way we work and redefining roles acros...
Jul 18, 2024
Precision AI — Revolutionizing Cybersecurity with Our Latest Campaign

Precision AI — Revolutionizing Cybersecurity with Our Latest Campaign

Like many organizations, his team’s cybersecurity was patched together using point product solutions from various vendors (more than 32...
Jun 27, 2024
Palo Alto Networks Cybersecurity Academy Supports Future Cyber Leaders

Palo Alto Networks Cybersecurity Academy Supports Future Cyber Leaders

Palo Alto Networks recently returned from its eighth consecutive year as a sponsor of the 2024 National Collegiate Cyber Defense Competition (NCCDC) in San Antonio, Texas, where th...
Jun 27, 2024
Leverage Platformization – Strengthen, Unify and Simplify Cybersecurity Tools

Leverage Platformization – Strengthen, Unify and Simplify Cybersecurity Too...

Cybersecurity is one of the most critical issues facing organizations today, and one of the most challenging to properly address. Techn...
Jun 26, 2024
Palo Alto Networks Excels in MITRE Managed Services Evaluation

Palo Alto Networks Excels in MITRE Managed Services Evaluation

Today, MITRE Engenuity unveiled the results of its second-ever ATT&CK Evaluations for Managed Services. For the second consecutive...
Jun 18, 2024
Advancing Innovation and Harnessing AI to Secure the Homeland

Advancing Innovation and Harnessing AI to Secure the Homeland

As Chief Technology Officer for Unit 42 and a cybersecurity educator, I have a unique vantage point into the cyberthreat landscape. I recently had the honor of testifying before th...
Jun 12, 2024
Forrester Names Palo Alto Networks a Leader in OT Security

Forrester Names Palo Alto Networks a Leader in OT Security

Palo Alto Networks has been named a leader in OT security in The Forrester Wave™: Operational Technology Security Solutions, Q2 2024 re...
Jun 11, 2024
Unit 42 — A Leader in The Forrester Wave for Cybersecurity Incident Response

Unit 42 — A Leader in The Forrester Wave for Cybersecurity Incident Respons...

Today, Palo Alto Networks Unit 42® was named a Leader in The Forrester Wave™: Cybersecurity Incident Response Services, Q2 2024. We see...
Jun 10, 2024

Network Security Blogs

Announcing OpenAI ChatGPT Enterprise Compliance Integration

Announcing OpenAI ChatGPT Enterprise Compliance Integration

As modern businesses evolve with today’s digital landscape, artificial intelligence (AI) has emerged as a transformative force, reshaping the way we work and redefining roles acros...
Jul 18, 2024
See How VM-Series Virtual Firewalls Pay for Themselves

See How VM-Series Virtual Firewalls Pay for Themselves

Read the Forrester Consulting Spotlight study commissioned by Palo Alto Networks to learn about a major component in our family of Next-Generation Firewalls (NGFWs): The VM-Series virtual firewall. You’ll disco...
Jul 10, 2024
Simplifying Network Security for Enterprises in Public Cloud

Simplifying Network Security for Enterprises in Public Cloud

As enterprises increasingly transition to the public cloud, they face a crucial decision: should they manage software firewalls in-house or outsource this critical function to experts? This question arises amon...
Jun 12, 2024
Forrester Names Palo Alto Networks a Leader in OT Security

Forrester Names Palo Alto Networks a Leader in OT Security

Palo Alto Networks has been named a leader in OT security in The Forrester Wave™: Operational Technology Security Solutions, Q2 2024 report. We receiv...
Jun 11, 2024
Learn how to protect your AWS AI applications at AWS re:Inforce 2024

Learn how to protect your AWS AI applications at AWS re:Inforce 2024

Palo Alto Networks will be showcasing our latest product innovations to defend against the evolving AI threat landscape at AWS re:Inforce 2024.
Jun 03, 2024
Putting More Cure In Secure With Medical IoT Security

Putting More Cure In Secure With Medical IoT Security

New capabilities that dramatically improve the end-to-end process of seeing and securing connected medical devices for network security and clinical engineering teams
May 20, 2024
Manufacturers key target for CIRCIA cyber incident reporting rule

Manufacturers key target for CIRCIA cyber incident reporting rule

CISA is requesting input on a new proposed rule that introduces a requirement for critical infrastructure organizations to report substantial cyber incidents and ransomware payment...
May 14, 2024
Untangling IT-OT Security Knots with a Zero Trust Platform Approach

Untangling IT-OT Security Knots with a Zero Trust Platform Approach

Organizations today are grappling with the complexities of digital transformation, a shifting threat landscape with the...
May 13, 2024

SASE Blogs

Uncover the Hidden Dangers in Your Identity Infrastructure

Uncover the Hidden Dangers in Your Identity Infrastructure

In today’s enterprise environment, the intricate web of interconnected SaaS applications, identity providers (IdP), and service accounts with disparat...
Jul 15, 2024
Announcing OpenAI ChatGPT Enterprise Compliance Integration

Announcing OpenAI ChatGPT Enterprise Compliance Integration

As modern businesses evolve with today’s digital landscape, artificial intelligence (AI) has emerged as a transformative force, reshaping the way we work and redefining roles across industries. As we stand on the cusp of a ne...
Jul 18, 2024
VDI Reduction: Enterprise Browsers Redefine Workspaces

VDI Reduction: Enterprise Browsers Redefine Workspaces

As cyberattacks keep evolving, security and IT leaders find themselves implementing multiple solutions to ensure a secure, agile, and productive work environment. Yet many traditio...
Jul 11, 2024
Palo Alto Networks a Leader Again in Gartner Single-Vendor SASE Report

Palo Alto Networks a Leader Again in Gartner Single-Vendor SASE Report

The 2024 recognition as a Leader in the Gartner Magic Quadrant for Single-Vendor SASE comes shortly after our acknowledgment as a Leade...
Jul 09, 2024
Improve Microsoft Teams Meeting Performance with ADEM

Improve Microsoft Teams Meeting Performance with ADEM

Effective communication and collaboration drive employee productivity and success in today's dynamic and hybrid work environment. Howev...
Jul 01, 2024
Myth Busting the Caching Fallacy

Myth Busting the Caching Fallacy

In our last myth-busting blog post, we covered the myth surrounding points of presence (PoPs) and their impact on app performance. This post illuminates yet another fallacy: using caching servers to boost SaaS app performance...
Jun 24, 2024
The Architecture Behind Prisma SASE & Its 99.999% Uptime

The Architecture Behind Prisma SASE & Its 99.999% Uptime

In today's digital landscape, organizations require robust, uninterrupted security services, where downtime can equate to significant o...
Jun 18, 2024
Strengthen Security & Efficiency: Dynamic Privileged Access

Strengthen Security & Efficiency: Dynamic Privileged Access

Hybrid work is here to stay, and maintaining business productivity requires that employees have secure remote access to critical projec...
Jun 13, 2024

Cloud Native Security Blogs

Cloud Security Simplified: NIST CSF 2.0 Meets Prisma Cloud

Cloud Security Simplified: NIST CSF 2.0 Meets Prisma Cloud

Earlier this year, the National Institute of Standards and Technology (NIST) published a major revision to their Cybersecurity Framework (CSF), known...
Jul 17, 2024
Where to Start When Dealing with Shadow Cloud Assets

Where to Start When Dealing with Shadow Cloud Assets

Exploring the latest enhancements of Cloud Discovery & Exposure Management (CDEM) to combat shadow IT with Prisma Cloud.
Jul 11, 2024
The Growing Dichotomy of AI-Powered Code in Cloud-Native Security

The Growing Dichotomy of AI-Powered Code in Cloud-Native Security

AI-generated code promises to reshape cloud-native application development practices, offering unparalleled efficiency gains and fostering innovation...
Jul 03, 2024
Peekaboo! We See Connections Between Your Shadow and Sanctioned Clouds

Peekaboo! We See Connections Between Your Shadow and Sanctioned Clouds

Shadow IT and unmanaged cloud assets pose significant security risks for organizations. Prisma Cloud, in recent months, has addressed this visibility...
Jul 02, 2024
Inject Security into Your AWS Development Pipeline

Inject Security into Your AWS Development Pipeline

Seamlessly integrate Code to Cloud security into your AWS development workflows with Prisma Cloud and AWS CodeCommit.
Jun 26, 2024
Empowering Developers and Security Teams with Prisma Cloud and Terraform

Empowering Developers and Security Teams with Prisma Cloud and Terraform

For cloud and development teams struggling with securing continuous rapid deployment (CI/CD) and needing faster security workflows, Prisma Cloud can help with cloud-native integrat...
Jun 25, 2024
CSPM Practitioners: Use AI To Your Advantage

CSPM Practitioners: Use AI To Your Advantage

For more than seven years now, cloud security posture management (CSPM) tools have provided cloud asset visibility, detected risky misconfigurations and monitored compliance postur...
Jun 21, 2024
Why EPSS Scores Matter for Vulnerability Management

Why EPSS Scores Matter for Vulnerability Management

Unaddressed security flaws can have significant repercussions — data breaches, financial loss, reputational damage — making vulnerability management critically important.
Jun 20, 2024

Security Operations Blogs

Rapid Response for OpenSSH Vulnerability CVE-2024-6387

Rapid Response for OpenSSH Vulnerability CVE-2024-6387

An unauthenticated remote code execution (RCE) vulnerability in OpenSSH’s server could potentially grant an attacker full root access, which poses a significant exploit risk. RegreSSHion, also known as CVE-2024-6387, was discovered by Qualy...
Jul 12, 2024
AI Provides an Rx for Cybersecurity in Healthcare

AI Provides an Rx for Cybersecurity in Healthcare

As cyberthreats evolve and proliferate, healthcare organizations are increasingly recognizing the need to embrace artificial intelligen...
Jul 10, 2024
Get Ahead of Chrome Changes with Cortex Xpanse

Get Ahead of Chrome Changes with Cortex Xpanse

In June 2024, Google announced it would no longer trust digital certificates issued by Entrust, a popular certificate authority. This d...
Jul 08, 2024
Introducing the New Cortex Shellcode AI Protection: A Precision AI-Driven Module
What’s Next in Cortex - New Wave of Innovations in Cortex (June 2024 Release)

What’s Next in Cortex - New Wave of Innovations in Cortex (June 2024 Releas...

With the ever evolving threat landscape, security operations teams require a new level of...
Jul 02, 2024
New Cloud Location Innovates and Strengthens Presence in Indonesia

New Cloud Location Innovates and Strengthens Presence in Indonesia

Palo Alto Networks has introduced its new cloud location in Indonesia, providing local businesses with direct access to a comprehensive...
Jul 01, 2024
Enhancing Critical Risk Detection with Cortex Xpanse Attack Surface Rules

Enhancing Critical Risk Detection with Cortex Xpanse Attack Surface Rules

Organizations are constantly scaling their IT infrastructure to meet the demands of cloud and hybrid work, but this acceleration also l...
Jun 30, 2024
Palo Alto Networks Excels in MITRE Managed Services Evaluation

Palo Alto Networks Excels in MITRE Managed Services Evaluation

Today, MITRE Engenuity unveiled the results of its second-ever ATT&CK Evaluations for Managed Services. For the second consecutive...
Jun 18, 2024

Unit 42 Threat Research

company article

Threat Brief: Operation MidnightEclipse, Post-Exploitation Activi...

We detail Operation MidnightEclipse, a campaign exploiting command injection vulnerability CVE-2024-3400, and include protections and mitigations....
April 12, 2024
By  Unit 42
company article

Beware of BadPack: One Weird Trick Being Used Against Android Dev...

Our data shows a pattern of APK malware bundled as BadPack files. We discuss how this technique is used to garble malicious Android files, creating challenges f...
July 16, 2024
company article

DarkGate: Dancing the Samba With Alluring Excel Files

We perform an in-depth study of a DarkGate malware campaign exploiting Excel files from early this year, assessing its functionality and its C2 traffic. ...
company article

Dissecting GootLoader With Node.js

We demonstrate effective methods to circumvent anti-analysis evasion techniques from GootLoader, a backdoor and loader malware distributed through fake forum po...
July 3, 2024
company article

Threat Brief: CVE-2024-6387 OpenSSH RegreSSHion Vulnerability

This threat brief details CVE-2024-6387, called RegreSSHion, an RCE vulnerability affecting connectivity tool OpenSSH servers on glibc-based Linux systems....
July 2, 2024
By  Unit 42
company article

The Contrastive Credibility Propagation Algorithm in Action: Impr...

Our novel contrastive credibility propagation algorithm improves on data loss prevention and has unique applications to sensitive material. ...
June 28, 2024
company article

Attackers Exploiting Public Cobalt Strike Profiles

Unit 42 researchers examine how attackers use publicly available Malleable C2 profiles, examining their structure to reveal evasive techniques....
company article

Attack Paths Into VMs in the Cloud

Virtual machines (VMs) are a significant attack target. Focusing on three major CSPs, this research summarizes the conditions for possible VM attack paths....
June 18, 2024
By  Jay Chen

Subscribe to the Newsletter!

Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.