Corporate Blogs

Today’s Attack Trends — Unit 42 Incident Response Report
Each year, Unit 42 Incident Response and Threat Intelligence teams help hundreds of organizations assess, respond and recover from cyberattacks. Along the way, we collect data about these incidents.
Feb 28, 2024
Short, Mid and Long-Term Impacts of AI in Cybersecurity
“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, cons...
Feb 01, 2024
Platforms in Action — Three Companies That Supercharged Risk Posture
Today’s organizations face cybersecurity challenges on multiple fronts. Many applications and workloads have moved to the cloud while employees now work in hybrid and remote enviro...
Jan 30, 2024
Palo Alto Networks — Strategic Partner on the Road to Quantum Readiness
Palo Alto Networks Participates in White House Quantum Security Roundtable; Selected to U.S. Cyber Center of Excellence for Post-Quantum Cryptography.
Jan 29, 2024
Healthcare Cybersecurity — Three Trends to Watch in 2024
Our new guide, The Healthcare CISO’s Guide to Cybersecurity Transformation, highlights the latest trends in healthcare today and where security leaders should focus their defensive...
Jan 26, 2024
Simplify, Scale and Accelerate Your SOC with AI-Driven Security
Traditional security operations centers (SOCs) are drowning in security alerts, and a lack...
Beyond the Hype — Where AI Can Shine in Security
“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42 with roles in AI research, product management, consu...
Jan 24, 2024
How AI-Powered Security Capabilities Implement Real-Time Cybersecurity
Security is critical to enterprise digital transformation strategy, enabling sustainable growth, performance and competitive differenti...
Jan 18, 2024

Network Security Blogs

From Ports to Protocols: Securing Maritime with Palo Alto Networks
The Marine Transportation System (MTS) is a pillar of U.S. trade and the broader economy. Its system of ports, terminals, vessels, waterways and land-side connections underpin $5.4...
Feb 29, 2024
UScellular and Palo Alto Networks Join Forces to Secure 5G
Remember when securing your network meant throwing up a firewall and calling it a day? Well, the cellular network industry has evolved, and so have th...
Feb 21, 2024
Hotel Customer Simplifies Network Security with Strata Cloud Manager
In the ever-evolving landscape of Network Security, organizations grapple with complex challenges, seeking innovative solutions to strengthen their defenses. Enter Strata Cloud Man...
Feb 20, 2024
Application Suite Monitoring for Every User, Branch & App
In today's digital landscape, organizations heavily rely on a suite of productivity applications, like Microsoft 365 and Google Suite for their day-to...
Feb 14, 2024
Palo Alto Networks helping customers in their Quantum Secure journey
It’s not clear who first uttered the quip: Of course, I can keep a secret. It's the people I tell it to that can't. But what’s clear is that there are plenty of times when it’s a m...
Jan 30, 2024
Creating Better, Defensible Substation Security Architectures
The concern over securing electrical grids from advanced attacks deployed by various threat actors, such as nation-states and well-resourced cybercriminals, is increasing. Creating...
Jan 25, 2024
Always Innovating: Innovations across NG-CASB, IoT/OT, Adv URL & SWFW
Welcome to the Nov-Dec 2023 edition of Always Innovating in Network Security from Palo Alto Networks. We have had a busy couple of months and as we enter the holidays, we bring you...
Dec 20, 2023
Research Shows 163% ROI with Palo Alto Networks Software Firewalls
Good news is here for cloud and network security professionals who need proven, cost-effective solutions that substantially reduce downtime and breaches across a range of cloud and...
Dec 14, 2023

SASE Blogs

Revolutionize User Experiences with App Acceleration
Today’s hybrid workforces primarily rely on Wi-Fi and cellular networks for critical business application connections. Unfortunately, these connections introduce wireless interference and packet loss that can p...
Feb 28, 2024
Understand SASE ROI for Network Security Transformation
In the fast-paced world of enterprise technology, staying ahead of the curve is not just an option. It's imperative. With the rise of h...
Feb 27, 2024
Telefónica Tech & Palo Alto Networks Secure Digital Transformation
Securing agile organizations as they embrace new technologies to drive innovation and growth is a monumental task, particularly when th...
Feb 26, 2024
Orange Business First to Deliver Prisma SASE with SP Interconnect
Orange Business, Orange Cyberdefense and Palo Alto Networks have further strengthened their partnership to deliver Palo Alto Networks P...
Prisma Access & Data Privacy: A Solution for Works Councils
Today’s large, distributed enterprises face an enormous challenge navigating the complex compliance requirements for safeguarding sensi...
Application Suite Monitoring for Every User, Branch & App
In today's digital landscape, organizations heavily rely on a suite of productivity applications, like Microsoft 365 and Google Suite f...
Feb 14, 2024
Unlocking the Economic Benefits of SASE
In the rapidly evolving landscape of enterprise technology, the adoption of cutting-edge solutions, like secure access service edge (SASE), is no longer a luxury but a necessity. P...
Jan 25, 2024
Managed Innovation: NTT's Managed Networks with Prisma SASE
In the dynamic landscape of network security, organizations grapple with the challenge of fortifying their digital infrastructure while staying ahead of the innovations. The synerg...
Jan 24, 2024

Cloud Native Security Blogs

Agent Vs Agentless: Determining the Right Deployment Option for Cloud Workload Protection (CWP)
Organizations are embracing the cloud to facilitate digital transformation, from lifting and shifting to building cloud-native applications. Utilizing...
Feb 29, 2024
5 Essential Components of a Cloud DLP Solution
The data loss prevention (DLP) landscape has taken a long while to catch up with the realities of the public cloud. In this post, we’ll explain why this tooling, developed in the o...
Feb 20, 2024
OpenAI Custom GPTs: What You Need to Worry About
The integration of OpenAI's Custom GPTs with personal data files and third-party APIs offers new opportunities for organizations looking for custom LLMs for a variety of needs. The...
Feb 15, 2024
Mastering Data Flow: Enhancing Security and Compliance in the Cloud
Many organizations struggle to determine their data’s precise locations and pathways, making it challenging to ensure security and compliance througho...
Feb 14, 2024
Container Escape: New Vulnerabilities Affecting Docker and RunC
A recent discovery identifies critical vulnerabilities affecting Docker and other container engines. Collectively called "Leaky Vessels", the vulnerab...
Feb 05, 2024
Forrester Names Prisma Cloud a Leader in Cloud Workload Security
Forrester has named Palo Alto Networks a Leader in The Forrester Wave™: Cloud Workload Security, Q1 2024. To us, this re...
Jan 30, 2024
Prisma Cloud Achieves “In Process” for FedRAMP High
Prisma Cloud takes the next step in working toward Federal Risk and Authorization Management Program (FedRAMP) High authorization and has achieved the "in process" milestone on the FedRAMP Marketplace.
Jan 23, 2024
Analyzing CVE-2023-50164: Apache Struts Path Traversal Vulnerability
On December 7, 2023, Apache released an advisory regarding CVE-2023-50164, a critical vulnerability with a severity of 9.8 that affects Apache Struts...
Dec 20, 2023

Security Operations Blogs

XSOAR 8.5: What’s New
XSOAR 8.5 continues the evolution of XSOAR 8 which started with a SaaS platform and tight integration with the Cortex suite of products.
Feb 15, 2024
Who’s the Boss? Teaming Up With AI in Security
“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, cons...
Feb 14, 2024
A Deep Dive Into Malicious Direct Syscall Detection
In this blog post we will explain how attackers use direct syscalls to overcome most EDR solutions, by first discussing the conventional Windows syscall flow and how most EDR solut...
Feb 13, 2024
What’s Next in Cortex - Expanded Visibility and Enhanced Protections with Latest Cortex Innovations
At Palo Alto Networks, we're constantly pushing the boundaries of security, and our latest wave of innovations is no exception. With ou...
Feb 12, 2024
The Role of AI in Reshaping Cybersecurity Careers
In the landscape of cybersecurity, the emergence of artificial intelligence (AI) stands as a transformative force used by both defenders and attackers. Its integration into cybersecurity practices will redefine our approach,...
Feb 08, 2024
Harnessing the Power of AI in Cybersecurity — Predictions and Solutions
“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42 with ro...
Feb 07, 2024
Playbook of the Week: Using YARA to Automate Malware Identification and Classification in XSOAR
In the dynamic realm of cybersecurity, maintaining a proactive defense against evolving threats is non-negotiable. One potent weapon th...
Feb 01, 2024
Short, Mid and Long-Term Impacts of AI in Cybersecurity
“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, cons...
Feb 01, 2024

Unit 42 Threat Research

company article
The RAT Bifrost has a new Linux variant that leverages a deceptive domain in order to compromise systems. We analyze this expanded attack surface....
February 29, 2024
company article
We illuminate lateral movement techniques observed in the wild within cloud environments, including Amazon Web Services (AWS), Google Cloud Platform (GCP) and M...
February 28, 2024
company article
Data leaks impacting Chinese IT security services company i-Soon reveal links to prior Chinese-affiliated APT campaigns found in the data. We summarize our find...
February 23, 2024
By  Unit 42
company article
Dynamic-link library (DLL) hijacking remains a popular technique to run malware. We address its evolution using examples from the realm of cybercrime and more. ...
February 22, 2024
company article
CVE-2024-1708 and CVE-2024-1709 affect ConnectWise remote desktop application ScreenConnect. This Threat Brief covers attack scope and includes our telemetry....
February 21, 2024
By  Unit 42
company article
Fundamental insights from Unit 42’s 2024 Incident Response report are summarized here. ...
February 20, 2024
By  Unit 42
company article
Insidious Taurus, aka Volt Typhoon, is a nation-state TA attributed to the People's Republic of China. We provide an overview of their current activity and miti...
February 14, 2024
By  Unit 42
company article
New zero-day vulnerability CVE-2023-50358 affects QNAP Network Attached Storage (NAS) devices. Our analysis includes its impact determined by our product data....
February 13, 2024

Subscribe to the Newsletter!

Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.