ONLY Cortex Delivers 100% Protection and Detection in MITRE Engenuity

The results of the fifth round of the MITRE Engenuity ATT&CK Evaluations have been released, and while every vendor is claiming 100% of everything, the truth is in the details, and the data does not lie. This year, Cortex is the only vendor with 100% prevention and analytic detection.

In the ever-evolving landscape of cybersecurity, staying one step ahead has never been more critical. Adversaries continuously seek new and sophistica...

Sep 20, 2023

Corporate Blogs

ONLY Cortex Delivers 100% Protection and Detection in MITRE Engenuity
The results of the fifth round of the MITRE Engenuity ATT&CK Evaluations have been released, and while every vendor is claiming 100% of everything...
Sep 20, 2023
Made for Taiwan: New Palo Alto Networks Cloud Location Includes Cortex
Palo Alto Networks is proud to announce a new cloud location in Taiwan, bringing Cortex XDR, Xpanse, XSOAR, and XSIAM to customers in the country. This is a testament to Palo Alto...
Sep 07, 2023
Palo Alto Networks Empowers MSPs with Prisma SASE Enhancements
The Only Leader in Single-Vendor SASE. Period.
Palo Alto Networks has been recognized as the sole Leader in the Gartner® Magic Quadrant™...
Aug 21, 2023
SEC Rule Sparks Reimagining of Cybersecurity Operations
The U.S. Securities and Exchange Commission (SEC) has placed cybersecurity at the center of public company governance with its new cybersecurity incident reporting rule. Companies...
Aug 17, 2023
Zero Trust Edge — Forrester Names Palo Alto Networks a Leader
Today, Palo Alto Networks was named a Leader in The Forrester Wave™: Zero Trust Edge Solut...
Aug 16, 2023
Deloitte Safeguards Software Development Lifecycle
As cloud computing continues to increase in popularity, businesses should consider remaini...
Aug 10, 2023
Multiplying Force with Automation — Reducing the Soul Crushing Work
In our fourth episode of "This Is How We Do It," Peter Havens from Cortex product marketin...
Aug 08, 2023

Network Security Blogs

Just Released and Ready for Download — Software Firewalls for Dummies
If you want to protect applications and workloads throughout today’s complex and interrelated environments, you need software firewalls. But, what exa...
Sep 19, 2023
Get Ready for Google Cloud Firewall Plus, Network Integration Ease
Are you seeking more simplicity and choice to secure your applications and workloads in Google Cloud? You’re not alone. Too often the need to secure applications built and deployed in the cloud — or being moved...
Aug 29, 2023
Always Innovating: Advanced Threat Prevention and Software Firewalls
Following our strong Fiscal Year 2023 financial results, we bring you the August 2023 edition of Always Innovating in Network Security. In this edition, we share our latest innovations in Advanced Threat Preven...
Aug 22, 2023
Cloud NGFW for AWS Integrates with Panorama
Now there’s yet another reason to deploy Cloud NGFW for AWS. The managed cloud firewall service — which provides best-in-class security with AWS cloud native ease of use — is now integrated with the Panorama™ m...
Aug 07, 2023
Prisma Access & Cloud Dynamic User Groups Find Risky Users
Prisma Access, the cloud-delivered security service edge platform from Palo Alto Networks, expands ZTNA 2.0 coverage to Microsoft Azure AD with Cloud...
Aug 04, 2023
Cloud NGFW for Azure Now Generally Available
We reached a big milestone for our customers with applications in the Azure public cloud. Two months ago, we launched the public preview version of Cloud NGFW for Azure, a managed next-generation firewall (NGFW...
Aug 01, 2023
Securing your Branches with Zero Compromise
This blog is part of the “Branch of the Future” series where we take a closer look at the four key tenets that next-generation SD-WAN and SASE provide to deliver a branch network that is digital-first, secure a...
Jul 28, 2023
Always Innovating: User Experience, Threat Coverage and Management
Our July 2023 edition of Always Innovating in Network Security is now here. Palo Alto Networks is always innovating to protect our customers and help them manage cyber risk. As we...
Jul 25, 2023

SASE Blogs

Meet AI-Powered Prisma SASE at SASE Converge 2023
Whether it’s helping us write a book or predict the likelihood of developing certain diseases, artificial intelligence (AI) has the opportunity to impact every aspect of our lives....
Sep 13, 2023
Use AI/ML to Fully Monetize Your Managed SD-WAN Solutions
Managed service providers (MSPs) globally find themselves in a challenging environment where intense competition and the commoditization of bandwidth have increasingly made it difficult to achieve and maintain profitability.
Sep 07, 2023
Palo Alto Networks Empowers MSPs with Prisma SASE Enhancements
Introducing Prisma Access Colo-Connect for Private App Access
The Only Leader in Single-Vendor SASE. Period.
Palo Alto Networks has been recognized as the sole Leader in the Gartner® Magic Quadrant™...
Aug 21, 2023
Introducing Email DLP: AI-Powered Data Protection for Email
With hybrid work as an established trend, employees increasingly rely on digital tools like email applications to collaborate and get w...
Aug 18, 2023
Zero Trust Edge — Forrester Names Palo Alto Networks a Leader
Today, Palo Alto Networks was named a Leader in The Forrester Wave™: Zero Trust Edge Solut...
Aug 16, 2023
The Rise of AI-Powered SASE and Digital Experience Monitoring: EMA Report Summary
In partnership with EMA, we’ve published a report “The Rise of AI-Powered SASE and Digital...
Aug 10, 2023

Cloud Native Security Blogs

The GitHub Actions Worm: Compromising GitHub Repositories Through the Actions Dependency Tree
Learn how a novel attack vector in GitHub Actions allows attackers to distribute malware across repositories using a technique that exploits the actio...
Sep 14, 2023
OpenID Connect: Let’s Talk Security
OpenID Connect (OIDC) is a modern authentication and authorization protocol built on top of the 0Auth 2.0 framework. OIDC enables secure and standardized authentication in applications, particularly web and mobile applications.
Sep 12, 2023
GigaOm Names Prisma Cloud a CSPM Leader, Second Consecutive Year
Moving to the cloud comes with technical complexities — security being one. Addressing the misconfigurations and risks contributes to this complexity,...
Aug 31, 2023
Unpinnable Actions: How Malicious Code Can Sneak into Your GitHub Actions Workflows
In today’s post, we look at action pinning, one of the profound mitigations against supply chain attacks in the GitHub Actions ecosystem. It turns out, though, that action pinning...
Aug 30, 2023
New Innovation Insight: CIEM Report from Gartner®
As the cloud continues to dominate the operating landscape, it has also revolutionized identity and access management, giving rise to new challenges — particularly with the proliferation of identities required...
Aug 23, 2023
Elevate Cybersecurity with PRISMA IDs
In the cybersecurity maze, finding and addressing vulnerabilities is like chasing shadows. Every point of weakness opens a door to potential threats. While many organizations rely on the CVE system to identify...
Aug 22, 2023
Third-Party GitHub Actions: Effects of an Opt-Out Permission Model
GitHub Actions has gained immense popularity in recent years as a powerful and flexible automation platform for software development workflows. With its intuitive user interface, e...
Aug 16, 2023
Deloitte Safeguards Software Development Lifecycle
As cloud computing continues to increase in popularity, businesses should consider remaining vigilant in protecting their information. Enterprises are...
Aug 10, 2023

Security Operations Blogs

ONLY Cortex Delivers 100% Protection and Detection in MITRE Engenuity
The results of the fifth round of the MITRE Engenuity ATT&CK Evaluations have been released, and while every vendor is claiming 100% of everything...
Sep 20, 2023
Playbook of the Week: Cloud Token Theft Response
Cloud computing's scalability, adaptability, and cost-efficiency have seen businesses increasingly utilize these services. Nevertheless, with the growth of cloud services come new...
Sep 14, 2023
Cybersecurity Insights: Upcoming Events with the Threat Research Team
Our Threat Research team at Palo Alto Networks is actively sharing their intelligence and findings on the global stage in some upcoming...
Sep 13, 2023
Data — The Lifeblood of Security and Detection Engineering
In episode 5 of “This Is How We Do It,” Peter Havens from Cortex product marketing and Isaac Krzywanowski, staff security engineer at P...
Sep 12, 2023
Made for Taiwan: New Palo Alto Networks Cloud Location Includes Cortex
Palo Alto Networks is proud to announce a new cloud location in Taiwan, bringing Cortex XDR, Xpanse, XSOAR, and XSIAM to customers in the country. This is a testament to Palo Alto...
Sep 07, 2023
Playbook of the Week: Automating DLP Incident Feedback
In today's digital landscape, data loss prevention (DLP) solutions have become a critical component for keeping sensitive data secure in an organization. With an increasing amount of data being generated and shared, the need...
Sep 07, 2023
From Cybersecurity Webmaster to CISO
Charting the course of my career, transitioning from a cybersecurity webmaster to chief information security officer (CISO), has given me unique insights (and scars) into the multifaceted nature of cybersecurity. Where preven...
Sep 06, 2023
When you hear about sinkholes, it’s not necessarily a good thing. However, in the cybersecurity realm, DNS sinkholing is a technique used to redirect DNS queries for malicious doma...
Aug 31, 2023

Unit 42 Threat Research

company article
Muddled Libra uses the 0ktapus phishing kit, among other advanced tactics. We detail our observations of their activity using the MITRE ATT&CK framework....
June 21, 2023
company article
A phony proof-of-concept (PoC) code for CVE-2023-40477 delivered a payload of VenomRAT. We detail our findings, including an analysis of the malicious code....
September 19, 2023
company article
A threat assessment of Turla (aka Pensive Ursa) breaks down this Russian-based APT's arsenal and techniques used, covering the top 10 active malware employed....
September 15, 2023
By  Unit 42
company article
The Unit 42 Attack Surface Threat Report examines the current global attack surface landscape. Here we present some key findings and share actionable data....
September 14, 2023
By  Unit 42
company article
Part two of our RedLine Stealer Wireshark quiz walks analysts through understanding a malware infection, from interpreting malicious traffic to identifying targ...
September 1, 2023
company article
Hacktool LaZagne can leverage the APIs of IPC mechanism D-Bus to fetch credentials. We reveal how this is done using observed malware campaigns....
August 24, 2023
company article
RedLine stealer harvests credentials and other data from a Windows host. Part one of this Wireshark tutorial analyzes RedLine traffic to determine what data was...
August 18, 2023
company article
Threat actors used SugarCRM's zero-day CVE-2023-22952 and cloud account misconfigurations to access credentials. We offer prevention advice....
August 10, 2023

Subscribe to the Newsletter!

Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.