Corporate Blogs

Stoked — Manifesting Innovation in Shared Threat Intelligence

Stoked — Manifesting Innovation in Shared Threat Intelligence

Explore how skateboarding's collaborative spirit mirrors sharing threat intelligence in cybersecurity, fostering innovation and collective defense aga...
Nov 25, 2024
A Security-First Approach to 6G

A Security-First Approach to 6G

5G and 6G can transform industries and drive the Industrial Revolution beyond connectivity. They need to provide Zero Trust, enterprise-grade security.
Nov 13, 2024
Exceptional User Experience — Every Application, Every Transaction

Exceptional User Experience — Every Application, Every Transaction

Palo Alto Networks ADEM empowers IT teams and optimizes productivity with visibility into users, branch sites, apps and IT infrastructure.
Nov 12, 2024
Strata Cloud Manager: One Interface, Complete Network Security Control
Shaking Up Security — The Power of AI-Native SOCs

Shaking Up Security — The Power of AI-Native SOCs

Discover how AI-native SOCs revolutionize cybersecurity, reducing alert fatigue and improving threat detection. Transform your security operations with AI.
Nov 06, 2024
Top Three Ways Organizations Were Unprepared for Cyberattacks in 2023

Top Three Ways Organizations Were Unprepared for Cyberattacks in 2023

2024 Incident Response report reveals top three ways organizations were unprepared for cyb...
Nov 05, 2024
Banking on AI to Defend the Financial Services Sector

Banking on AI to Defend the Financial Services Sector

Discover how financial institutions leverage AI to combat cyberthreats, enhance fraud detection, and streamline operations. Learn about FinTech security.
Oct 31, 2024
Securing AI Infrastructure for a More Resilient Future

Securing AI Infrastructure for a More Resilient Future

Governments that are actively developing broad, risk-based, AI regulatory frameworks have concurrently established AI safety institutes...
Oct 30, 2024

Network Security Blogs

Learn How to Secure Your AWS Workloads at AWS re:Invent 2024

Learn How to Secure Your AWS Workloads at AWS re:Invent 2024

Join Palo Alto Networks in booth #1124 at AWS re:Invent 2024 to learn how to secure your AWS workloads & protect your cloud environments.
Nov 26, 2024
Empower Developers to Secure AI Applications Through Code

Empower Developers to Secure AI Applications Through Code

Developers can now secure their AI applications with a few lines of code. Read the AI Runtime Security API intercept announcement.
Nov 19, 2024
Exceptional User Experience — Every Application, Every Transaction

Exceptional User Experience — Every Application, Every Transaction

Palo Alto Networks ADEM empowers IT teams and optimizes productivity with visibility into users, branch sites, apps and IT infrastructure.
Nov 12, 2024
Strata Cloud Manager: One Interface, Complete Network Security Control

Strata Cloud Manager: One Interface, Complete Network Security Control

Strata Cloud Manager offers AIOps, Digital Experience Management (DEM), and management capabilities in a single, cohesiv...
Nov 07, 2024
Safeguard OT Environments with the Power of Precision AI

Safeguard OT Environments with the Power of Precision AI

New capabilities safeguard OT remote operations, mitigate risks for hard-to-patch assets, and extend protection into industrial environments.
Oct 21, 2024
The Future of Shopping: How Smart Stores are Transforming Retail

The Future of Shopping: How Smart Stores are Transforming Retail

Discover how IoT and smart stores are transforming retail with enhanced experiences and efficiency, while ensuring security with Palo Alto Networks.
Oct 17, 2024
Strata Copilot is Here

Strata Copilot is Here

Announcing the availability of Strata Copilot, the ultimate AI assistant for Network Security.
Oct 15, 2024
Secure AI Applications by Design. AI Runtime Security, Now Available.

Secure AI Applications by Design. AI Runtime Security, Now Available.

Secure your AI applications, models and data from new set of AI threats.
Oct 11, 2024

SASE Blogs

A New Phishing Frontier: From Email to SaaS Collaboration Apps

A New Phishing Frontier: From Email to SaaS Collaboration Apps

Phishing threats have jumped from email into collaboration SaaS apps like Microsoft Teams, Slack and Zoom. Find out how to protect yourself.
Nov 27, 2024
Palo Alto Networks Announces New SD-WAN Innovations

Palo Alto Networks Announces New SD-WAN Innovations

Deliver exceptional user experience, integrated user & app security, and operational resiliency & simplicity for the Zero Trust Branch.
Nov 26, 2024
Ride the Next Wave of AI-Powered SASE at AWS re:Invent 2024

Ride the Next Wave of AI-Powered SASE at AWS re:Invent 2024

Register for AWS re:Invent & find out how AI-powered Prisma SASE can help raise the bar on securing & managing access to cloud applications.
Nov 22, 2024
Securing Campus Networks with Prisma Access and Nile

Securing Campus Networks with Prisma Access and Nile

Prisma Access & Nile integration addresses campus & cloud environment security challenges to enhance protection, visibility & efficienc...
Nov 21, 2024
Secure Browsing Demands More Than Extensions

Secure Browsing Demands More Than Extensions

Organizations need an enterprise browser and a security-focused browser extension to protect data and secure unmanaged devices. Read more.
Nov 14, 2024
Exceptional User Experience — Every Application, Every Transaction

Exceptional User Experience — Every Application, Every Transaction

Palo Alto Networks ADEM empowers IT teams and optimizes productivity with visibility into users, branch sites, apps and IT infrastructure.
Nov 12, 2024
Operational Resilience: Ensuring Business Continuity with Prisma SASE

Operational Resilience: Ensuring Business Continuity with Prisma SASE

Operational resilience in Prisma SASE helps companies run with the highest levels of relia...
Nov 11, 2024
Strata Cloud Manager: One Interface, Complete Network Security Control

Cloud Native Security Blogs

Discover, Protect and Respond with AWS and Prisma Cloud

Discover, Protect and Respond with AWS and Prisma Cloud

The complex landscape of cloud services, particularly in multi-cloud environments, poses significant security challenges for organizations. Unmanaged cloud resources, human error, misconfigurations and the incr...
Nov 22, 2024
Experience Next-Generation Cloud Security at AWS re:Invent 2024

Experience Next-Generation Cloud Security at AWS re:Invent 2024

Join Prisma Cloud by Palo Alto Networks at AWS re:Invent 2024 in Las Vegas for AI security sessions, in-booth theaters, JAM sessions and demos at booth #1124.
Nov 19, 2024
Data Security, Meet Remediation: Introducing the New Integration Between Prisma Cloud DSPM and Cortex XSOAR

Data Security, Meet Remediation: Introducing the New Integration Between Pr...

Data Security: New Prisma Cloud DSPM & Cortex XSOAR integration automates remediation, enhancing security and governance in diverse cloud environments...
Nov 06, 2024
Shifting Security Left with Prisma Cloud and HashiCorp Packer

Shifting Security Left with Prisma Cloud and HashiCorp Packer

Use Prisma Cloud to secure Packer images by HashiCorp and protect your entire CI/CD pipeline with comprehensive compliance support.
Nov 01, 2024
GigaOm Recognizes Prisma Cloud as a CNAPP Leader

GigaOm Recognizes Prisma Cloud as a CNAPP Leader

CNAPP: Prisma Cloud leads the pack in GigaOm's inaugural CNAPP Radar report, excelling in key features like CIEM, risk prioritization and resource behavior monitoring.
Oct 29, 2024
Shift Left: Should You Push It or Pull It?

Shift Left: Should You Push It or Pull It?

Shift left with code to cloud strategies integrating protection at every stage, mitigate risks, enhance developer workflows, and secure production environments.
Oct 24, 2024
Understanding the Costs and Benefits of DSPM Tools

Understanding the Costs and Benefits of DSPM Tools

Discover the costs and benefits of DSPM tools, including deployment considerations, cost components, security value, and potential cloud cost savings.
Oct 16, 2024
Tame Complexity, Turbocharge Security: Prisma Cloud Copilot

Tame Complexity, Turbocharge Security: Prisma Cloud Copilot

Enhance your cloud security with AI-driven analysis, insights and automation. Simplify threat detection, vulnerability management, and compliance for ...
Oct 15, 2024

Security Operations Blogs

Stoked — Manifesting Innovation in Shared Threat Intelligence

Stoked — Manifesting Innovation in Shared Threat Intelligence

Explore how skateboarding's collaborative spirit mirrors sharing threat intelligence in cybersecurity, fostering innovation and collective defense aga...
Nov 25, 2024
Automation in Action — How 3 Customers Revolutionized SecOps with XSOAR

Automation in Action — How 3 Customers Revolutionized SecOps with XSOAR

See how three of Palo Alto Networks customers across various industries and regions are leveraging Cortex XSOAR.
Nov 20, 2024
Identify 60 Additional Server Protocols with Cortex Xpanse

Identify 60 Additional Server Protocols with Cortex Xpanse

Discover how Cortex Xpanse now identifies 60 additional server protocols in your attack surface, protecting against emerging threats across proxy, network, and database servers.
Nov 12, 2024
By 
Optimize Analyst Workflows with Cortex Copilot

Optimize Analyst Workflows with Cortex Copilot

Discover how Cortex Copilot streamlines security analyst workflows, reduces burnout, and accelerates incident investigations by leveraging AI to automate mundane tasks.
Nov 07, 2024
Shaking Up Security — The Power of AI-Native SOCs

Shaking Up Security — The Power of AI-Native SOCs

Discover how AI-native SOCs revolutionize cybersecurity, reducing alert fatigue and improving threat detection. Transform your security operations with AI.
Nov 06, 2024
Banking on AI to Defend the Financial Services Sector

Banking on AI to Defend the Financial Services Sector

Discover how financial institutions leverage AI to combat cyberthreats, enhance fraud detection, and streamline operations. Learn about FinTech security.
Oct 31, 2024
Cloud Security — Maturing Past the Awkward Teenage Years

Cloud Security — Maturing Past the Awkward Teenage Years

Explore cloud security's maturation, common misconceptions, and best practices for robust cloud defenses.
Oct 22, 2024
Cutting Through the Noise: Simplifying SIEM Alerts with Cortex

Cutting Through the Noise: Simplifying SIEM Alerts with Cortex

Discover how integrating Cortex XSOAR with Splunk SIEM reduces false positives, automates alert triage, and enhances cybersecurity effi...
Oct 16, 2024

Unit 42 Threat Research

company article

Threat Brief: Operation Lunar Peek, Activity Related to CVE-2024-...

We detail the observed limited activity regarding authentication bypass vulnerability CVE-2024-0012 affecting specific versions of PAN-OS software, and include ...
November 22, 2024
By  Unit 42
company article

Lateral Movement on macOS: Unique and Popular Techniques and In-t...

We uncover macOS lateral movement tactics, such as SSH key misuse and AppleScript exploitation. Strategies to counter this attack trend are also discussed....
November 22, 2024
company article

Threat Assessment: Ignoble Scorpius, Distributors of BlackSuit Ra...

Explore this assessment on cybercrime group Ignoble Scorpius, distributors of BlackSuit ransomware. Since May 2023, operations have increased —affecting criti...
November 20, 2024
By  Unit 42
company article

FrostyGoop’s Zoom-In: A Closer Look into the Malware Artifacts, B...

We analyze FrostyGoop malware, which targets OT systems. This article walks through newly discovered samples, indicators, and also examines configurations and n...
November 19, 2024
company article

Fake North Korean IT Worker Linked to BeaverTail Video Conference...

North Korean IT worker cluster CL-STA-0237 instigated phishing attacks via video apps in Laos, exploiting U.S. IT firms and major tech identities....
November 14, 2024
By  Unit 42
company article

Global Companies Are Unknowingly Paying North Koreans: Here’s How...

We discuss North Korea's use of IT workers to infiltrate companies, detailing detection strategies like IT asset management and IP analysis to counter this....
November 13, 2024
company article

ModeLeak: Privilege Escalation to LLM Model Exfiltration in Verte...

New research reveals two vulnerabilities in Google's Vertex AI that may lead to privilege escalation or data theft through custom jobs or malicious models....
November 12, 2024
company article

Silent Skimmer Gets Loud (Again)

We discuss a new campaign from the cybercrime group behind Silent Skimmer, showcasing the exploit of Telerik UI vulnerabilities and malware like RingQ loader....
November 7, 2024

Subscribe to the Newsletter!

Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.