Corporate Blogs

Who’s the Boss? Teaming Up With AI in Security
“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, consulting, engineering and more....
Feb 14, 2024
Beyond the Hype — Where AI Can Shine in Security
“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42 with roles in AI research, product management, consu...
Jan 24, 2024
How AI-Powered Security Capabilities Implement Real-Time Cybersecurity
Security is critical to enterprise digital transformation strategy, enabling sustainable growth, performance and competitive differenti...
Jan 18, 2024
AI in Security — Ready for Prime Time
“AI’s Impact in Cybersecurity” is a regular blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42 with roles in AI research, product management, consulting, engineering and more. Our obje...
Jan 17, 2024
Partnering with Government to Strengthen Cyber Resilience in Poland
We are honored to partner with the Polish Government as part of its Polish Cybersecurity Partnership Program (PWCyber) program to help...
Jan 16, 2024
Palo Alto Networks Recognized as a Leader in the 2023 Gartner Magic Quadrant for Endpoint Protection Platforms (EPP)
In an era when cyberthreats are evolving faster than ever before, cyber defenders around t...
Jan 12, 2024
AI Is Changing Security — 5 Predictions from Cortex
“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42 with roles in AI research, product management, consu...
Jan 10, 2024
CISOs Take Note — Don't Let AI Adoption Outpace Due Diligence
“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42 with ro...
Jan 03, 2024

Network Security Blogs

Hotel Customer Simplifies Network Security with Strata Cloud Manager
In the ever-evolving landscape of Network Security, organizations grapple with complex challenges, seeking innovative solutions to strengthen their defenses. Enter Strata Cloud Man...
Feb 20, 2024
Application Suite Monitoring for Every User, Branch & App
In today's digital landscape, organizations heavily rely on a suite of productivity applications, like Microsoft 365 and Google Suite for their day-to...
Feb 14, 2024
Palo Alto Networks helping customers in their Quantum Secure journey
It’s not clear who first uttered the quip: Of course, I can keep a secret. It's the people I tell it to that can't. But what’s clear is that there are plenty of times when it’s a m...
Jan 30, 2024
Creating Better, Defensible Substation Security Architectures
The concern over securing electrical grids from advanced attacks deployed by various threat actors, such as nation-states and well-resourced cybercriminals, is increasing. Creating...
Jan 25, 2024
Always Innovating: Innovations across NG-CASB, IoT/OT, Adv URL & SWFW
Welcome to the Nov-Dec 2023 edition of Always Innovating in Network Security from Palo Alto Networks. We have had a busy couple of months and as we enter the holidays, we bring you...
Dec 20, 2023
Research Shows 163% ROI with Palo Alto Networks Software Firewalls
Good news is here for cloud and network security professionals who need proven, cost-effective solutions that substantially reduce downtime and breaches across a range of cloud and...
Dec 14, 2023
Palo Alto Networks Paves the Way with New OT Security Innovations
Earlier this year, Palo Alto Networks launched Zero Trust OT Security, a solution to help industrial asset owners and operators keep their operational...
Nov 29, 2023
Palo Alto Networks Outperforms Against Cobalt Strike Attacks
Palo Alto Networks is the leading vendor in preventing Cobalt Strike C2 communication. According to the recently published report by SecureIQlab, Palo Alto Networks is the only lea...
Nov 15, 2023

SASE Blogs

Prisma Access & Data Privacy: A Solution for Work Councils
Today’s large, distributed enterprises face an enormous challenge navigating the complex compliance requirements for safeguarding sensitive informatio...
Application Suite Monitoring for Every User, Branch & App
In today's digital landscape, organizations heavily rely on a suite of productivity applications, like Microsoft 365 and Google Suite f...
Feb 14, 2024
Unlocking the Economic Benefits of SASE
In the rapidly evolving landscape of enterprise technology, the adoption of cutting-edge solutions, like secure access service edge (SASE), is no longer a luxury but a necessity. P...
Jan 25, 2024
Managed Innovation: NTT's Managed Networks with Prisma SASE
In the dynamic landscape of network security, organizations grapple with the challenge of fortifying their digital infrastructure while staying ahead of the innovations. The synerg...
Jan 24, 2024
Introducing App Acceleration for Prisma SASE
Modern enterprises face an increasingly complex challenge: the distributed workforce relies on high-performance apps, but enterprises can’t guarantee a consistent app experience fo...
Jan 18, 2024
Why Traditional DLP Fails to Protect Your Most Sensitive Data
Safeguarding your business's unique data is more crucial than ever. Traditional Data Loss Prevention (DLP) systems are struggling to ke...
Dec 06, 2023
You vibe with SASE now—but are you ready for a long-term relationship?
The modern digital landscape is ever-evolving. This means that you don’t only need a robust approach to your security, but you must als...
Dec 05, 2023
Palo Alto Networks Natively Integrates RBI with SASE
Organizations must be able to absorb economic stress, recover quickly, and adjust to changing business circumstances to be successful....
Nov 29, 2023

Cloud Native Security Blogs

5 Essential Components of a Cloud DLP Solution
The data loss prevention (DLP) landscape has taken a long while to catch up with the realities of the public cloud. In this post, we’ll explain why this tooling, developed in the o...
Feb 20, 2024
OpenAI Custom GPTs: What You Need to Worry About
The integration of OpenAI's Custom GPTs with personal data files and third-party APIs offers new opportunities for organizations looking for custom LLMs for a variety of needs. The...
Feb 15, 2024
Mastering Data Flow: Enhancing Security and Compliance in the Cloud
Many organizations struggle to determine their data’s precise locations and pathways, making it challenging to ensure security and compliance througho...
Feb 14, 2024
Container Escape: New Vulnerabilities Affecting Docker and RunC
A recent discovery identifies critical vulnerabilities affecting Docker and other container engines. Collectively called "Leaky Vessels", the vulnerab...
Feb 05, 2024
Forrester Names Prisma Cloud a Leader in Cloud Workload Security
Forrester has named Palo Alto Networks a Leader in The Forrester Wave™: Cloud Workload Security, Q1 2024. To us, this re...
Jan 30, 2024
Prisma Cloud Achieves “In Process” for FedRAMP High
Prisma Cloud takes the next step in working toward Federal Risk and Authorization Management Program (FedRAMP) High authorization and has achieved the "in process" milestone on the FedRAMP Marketplace.
Jan 23, 2024
Analyzing CVE-2023-50164: Apache Struts Path Traversal Vulnerability
On December 7, 2023, Apache released an advisory regarding CVE-2023-50164, a critical vulnerability with a severity of 9.8 that affects Apache Struts...
Dec 20, 2023
Shadow Data Is Inevitable, But Security Risks Aren’t
Shadow data is inevitable, particularly with the shift to cloud and data democratization. The ease of creating shadow data assets and the potential for faster insights incentivize...
Dec 12, 2023

Security Operations Blogs

XSOAR 8.5: What’s New
XSOAR 8.5 continues the evolution of XSOAR 8 which started with a SaaS platform and tight integration with the Cortex suite of products.
Feb 15, 2024
Who’s the Boss? Teaming Up With AI in Security
“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, cons...
Feb 14, 2024
A Deep Dive Into Malicious Direct Syscall Detection
In this blog post we will explain how attackers use direct syscalls to overcome most EDR solutions, by first discussing the conventional Windows syscall flow and how most EDR solut...
Feb 13, 2024
What’s Next in Cortex - Expanded Visibility and Enhanced Protections with Latest Cortex Innovations
At Palo Alto Networks, we're constantly pushing the boundaries of security, and our latest wave of innovations is no exception. With ou...
Feb 12, 2024
The Role of AI in Reshaping Cybersecurity Careers
In the landscape of cybersecurity, the emergence of artificial intelligence (AI) stands as a transformative force used by both defenders and attackers. Its integration into cybersecurity practices will redefine our approach,...
Feb 08, 2024
Harnessing the Power of AI in Cybersecurity — Predictions and Solutions
“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42 with ro...
Feb 07, 2024
Playbook of the Week: Using YARA to Automate Malware Identification and Classification in XSOAR
In the dynamic realm of cybersecurity, maintaining a proactive defense against evolving threats is non-negotiable. One potent weapon th...
Feb 01, 2024
Short, Mid and Long-Term Impacts of AI in Cybersecurity
“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, cons...
Feb 01, 2024

Unit 42 Threat Research

company article
Insidious Taurus, aka Volt Typhoon, is a nation-state TA attributed to the People's Republic of China. We provide an overview of their current activity and miti...
February 14, 2024
By  Unit 42
company article
New zero-day vulnerability CVE-2023-50358 affects QNAP Network Attached Storage (NAS) devices. Our analysis includes its impact determined by our product data....
February 13, 2024
company article
A 2023 Glupteba campaign includes an unreported feature — a UEFI bootkit. We analyze its complex architecture and how this botnet has evolved....
February 12, 2024
company article
Analysis of ransomware gang leak site data reveals significant activity over 2023. As groups formed — or dissolved — and tactics changed, we synthesize our ...
February 5, 2024
company article
Evaluation of a new variant of Mispadu, a banking Trojan, highlights how infostealers evolve over time and can be hard to pin to past campaigns....
February 2, 2024
company article
A network of over 130k domains was part of a campaign to deliver shareware, PUPs and other scams. We unravel the threads of this campaign from entry point to pa...
company article
We analyze the extremely active ransomware group BianLian. Mostly targeting healthcare, they have moved from double-extortion to extortion without encryption....
January 23, 2024
company article
Traffic detection system Parrot has infected tens of thousands of websites worldwide. We outline the scripting evolution of this injection campaign and its scop...
January 19, 2024

Subscribe to the Newsletter!

Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.