[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-security-solution?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.paloaltonetworks.com/deploybravely?ts=markdown) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Threats](https://www.paloaltonetworks.com/cyberpedia/threat?ts=markdown) 3. [What is Mobile Malware?](https://www.paloaltonetworks.com/cyberpedia/what-is-mobile-malware?ts=markdown) Table of Contents * [Understanding Mobile Malware](#understanding) * [Historical Context and Evolution of Malware](#historical) * [How Is Mobile Malware Used?](#how) * [What Are Common Types of Mobile Malware?](#what) * [Mobile Malware Attack Real-World Scenarios and Consequences](#mobile) * [Mobile Malware Detection and Prevention Strategies](#strategies) * [Best Practices for Protect Against Mobile Malware](#best) * [Mobile Malware FAQs](#faqs) # What is Mobile Malware? 5 min. read Table of Contents * [Understanding Mobile Malware](#understanding) * [Historical Context and Evolution of Malware](#historical) * [How Is Mobile Malware Used?](#how) * [What Are Common Types of Mobile Malware?](#what) * [Mobile Malware Attack Real-World Scenarios and Consequences](#mobile) * [Mobile Malware Detection and Prevention Strategies](#strategies) * [Best Practices for Protect Against Mobile Malware](#best) * [Mobile Malware FAQs](#faqs) 1. Understanding Mobile Malware * [1. Understanding Mobile Malware](#understanding) * [2. Historical Context and Evolution of Malware](#historical) * [3. How Is Mobile Malware Used?](#how) * [4. What Are Common Types of Mobile Malware?](#what) * [5. Mobile Malware Attack Real-World Scenarios and Consequences](#mobile) * [6. Mobile Malware Detection and Prevention Strategies](#strategies) * [7. Best Practices for Protect Against Mobile Malware](#best) * [8. Mobile Malware FAQs](#faqs) Mobile malware is malicious software, such as trojans and ransomware, explicitly designed to target operating systems and applications on mobile devices. Mobile users are subjected to mobile malware attacks through social engineering exploits that allow them to circumvent the mobile security systems on popular platforms such as Apple and Android. Widely used attack tactics include: * Viruses * Worms * Trojans * Adware * Spyware. Various motives drive attackers, but their primary goals often include the theft of [sensitive data](https://www.paloaltonetworks.com/cyberpedia/sensitive-data?ts=markdown) to facilitate identity theft, financial fraud, or espionage, as well as the installation of malicious software designed to capture credentials. ![Crisis in the Kitchen: Unraveling a Malware Incident](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/mobile-malware/video-thumbnail-unraveling-malware-incident.jpg) *Crisis in the Kitchen: Unraveling a Malware Incident* close ## Understanding Mobile Malware The sophistication and variety of mobile [malware](https://www.paloaltonetworks.com/cyberpedia/what-is-malware?ts=markdown) have rapidly evolved, presenting significant threats to mobile users. These users are increasingly targeted through advanced [social engineering](https://www.paloaltonetworks.com/cyberpedia/what-is-social-engineering?ts=markdown) tactics, which enable attackers to bypass comprehensive security systems on popular platforms like Android and iOS, unleashing a range of malicious software activities. The continuously evolving landscape of mobile technology and the proliferation of mobile device use in personal and professional contexts further underscore the pressing need for heightened awareness and defense mechanisms against mobile malware threats. ### Scope of Mobile Malware Although mobile threats are less pervasive than traditional malware, cybercriminals are increasingly exploiting the mobile-first trend. For organizations, the explosion of bring-your-own-device (BYOD) and personal device use for work gives attackers fertile ground to launch mobile malware attacks. Despite efforts to control personal device usage, their shadow use is pervasive. The lack of security on these mobile devices makes them a target for attackers seeking to gain access to networks and systems to steal assets or conduct additional attacks. Due to the limited visibility into mobile devices and the multitude that lack anti-malware antivirus software, they are increasingly used to launch zero-day and other devastating attacks. Additional reasons for the growth of mobile malware are: * A growing volume of sensitive and high-value tasks are carried out on mobile devices. * Mobile devices are often connected to insecure external networks, like public Wi-Fi. * Threat actors can hide malicious software amongst legitimate apps in third-party app stores. * Users are more likely to click malicious links in legitimate-looking email or text messages on mobile devices. ## Historical Context and Evolution of Malware Mobile devices have been targeted since the turn of the millennium. Purpose-built mobile malware was first seen in 2004. Since then, mobile malware has grown in use and sophistication. The following timeline provides a brief overview of its evolution. |--------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | **2004** | The first mobile virus, a worm called Cabir, was released, using the Bluetooth OBEX push protocol to spread. It targeted the Symbian operating system, one of the earliest smartphone operating systems used by Nokia, Sony Ericsson, and Samsung. | | **2005** | The Commwarrior worm was discovered. It was the first mobile malware to propagate using Bluetooth and MMS messaging. | | **2009** | Ikee and Duh, two mobile malware worms, emerged and targeted jailbroken iPhones. This type of mobile malware exploited a hard-coded password in the Secure Shell (SSH) daemon running on targeted devices and exposed it in jailbreak. | | **2010** | FakePlayer malware targeted Android and iOS devices. This mobile malware was disguised as a media player app. Once installed, it secretly sent premium-rate SMS messages to Russian shortcode numbers, resulting in costly unauthorized user charges. | | **2011** | A mobile malware attack on Google Play triggered a surge in mobile Trojans and spyware embedded in malicious apps, which were especially prevalent on third-party Android marketplaces. 2011 also saw the evolution of the traditional malware banking Trojan, Zeus, to Zitmo (Zeus-in-the-mobile). Zitmo intercepted SMS messages with two-factor authentication (2FA) codes to enable attackers to access users' banking accounts. | | **2012** | The evolution of banking malware continued with the adaptation of OpFake. The mobile version of this malware evolved from an early SMS Trojan. Disguised as an Opera Mini web browser (i.e., a lightweight web browser for mobile devices) updater, OpFake emerged as one of the first large-scale botnets targeting Android devices. | | **2013** | FakeDefender emerged as a mobile ransomware targeting Android devices. It posed as a fake antivirus application that blocked access to the device, demanding a ransom to regain control. | | **2014** | AirPush, intrusive mobile adware, started pushing unwanted ads to targeted devices. While the pop-ups usually just resulted in a poor user experience on the infected device, some variants behaved maliciously by displaying ads in the notification bar, delivering malvertising, and creating shortcuts to spam users. | | **2015** | Gazon, an Android virus, was used to infect mobile devices. Once compromised, the mobile malware sent phishing messages to contacts on the device containing a link to install malware. In this case, the link was disguised as an Amazon rewards app. | | **2016** | HummingBad, mobile adware, infected over 10 million Android devices. This mobile malware generates fraudulent ad revenue by displaying ads in the background. | | **2017** | Xavier mobile malware emerged targeted Android devices with an information-stealing ad library embedded within more than 800 seemingly legitimate apps in the Google Play Store. Once installed, Xavier collected sensitive data and evaded detection by encrypting its communications. | | **2018** | Rotexy was used in more than 70,000 attacks. This mobile malware evolved from earlier versions initially identified as SMS spyware Trojans, becoming more sophisticated over time by combining the features of both ransomware and a banking Trojan. | | **2019** | StrandHogg was first publicly disclosed as a new strain of mobile malware that exploited a vulnerability in Android's multitasking system. This mobile malware allowed malicious apps to masquerade as legitimate ones, steal credentials, and access sensitive data without root access. | | **2020** | Smishing (SMS phishing) attacks have become more sophisticated and prevalent. The global pandemic was widely exploited for smishing attacks, taking advantage of individuals' fears and desire for information about COVID-19. | | **2021** | The expansion of 5G and IoT networks enabled mobile malware to evolve. New strains of mobile malware, such as Mirai variants, infected IoT devices. Additionally, Android ransomware, FLocker, evolved to target IoT devices. | | **2022 - present** | AI-driven malware (e.g., Cerberus and Emotet) and fileless attacks (e.g., HummingWhale, derived from HummingBad, and XLoader) emerged, enabling mobile malware to evade traditional detection mechanisms. These mobile malware strains can adapt quickly, making traditional signature-based detection ineffective. | ## How Is Mobile Malware Used? The most common use of mobile malware is to steal sensitive information, such as usernames and passwords, bank account numbers, Social Security numbers, private messages, and location information. Cybercriminals also use mobile malware to generate revenue through ad fraud (e.g., sending unwanted ads to generate fake ad clicks) and installing cryptomining tools to generate cryptocurrency. Mobile malware is also used to compromise accounts and exploit [vulnerabilities](https://www.paloaltonetworks.com/cyberpedia/vulnerability-management?ts=markdown). Once installed, mobile malware can be spread to other devices in the initial target's network. Mobile malware can also [move laterally](https://www.paloaltonetworks.com/cyberpedia/what-is-lateral-movement?ts=markdown) across networks to gain additional access privileges. ## What Are Common Types of Mobile Malware? Mobile malware comes in many of the same varieties as traditional malware but is optimized to exploit the differences in mobile environments. Early strains of mobile malware targeted legacy platforms, such as BlackBerry OS and Symbian OS. Today, most mobile malware targets iOS and Android devices. The following are several of the most widely seen types of mobile malware. ### Cryptomining Malware Attackers use cryptomining malware to generate cryptocurrency using compromised mobile devices' processing power. An example is the ADB.miner mobile malware, which targets Android devices for this purpose. ### Drive-By Downloads Traditional drive-by-download malware is used to target mobile devices. Some types of malware that can be pre-installed in drive-by downloads include trojans, [ransomware](https://www.paloaltonetworks.com/cyberpedia/what-is-ransomware?ts=markdown), keyloggers, [botnets](https://www.paloaltonetworks.com/cyberpedia/what-is-botnet?ts=markdown), and data transfer tools. ### MMS Malware MMS malware spreads through text messages with text, photos, and videos. An example of MMS malware is FluBot, used in a large-scale [smishing attack](https://www.paloaltonetworks.com/cyberpedia/what-is-smishing?ts=markdown) that targeted Android devices in Europe. ### Mobile Bots Mobile malware is used to create mobile botnets. Ikee.B was the first mobile malware bot software detected. SpamSoldier is an Android SMS botnet that sends spam messages to other victims without the user's permission. ### Mobile Phishing Mobile [phishing](https://www.paloaltonetworks.com/cyberpedia/what-is-phishing?ts=markdown) attacks are sent via email or SMS text messages, often called SMiShing. Tactics used for mobile phishing include using Tiny URLs to disguise malicious sites and URL padding, which conceals a malicious domain by embedding it in a legitimate one. ### Remote Access Tools (RATs) RATs are used to access data on infected mobile devices. They are often used to access information on mobile devices, such as installed applications, call history, address books, web browsing history, and SMS data. RATs also send SMS messages, enable device cameras, and log GPS data. ### Trojan Horses Cybercriminals typically insert Trojans into non-malicious executable files or apps on compromised devices. Several types of Trojans used for mobile malware exploits include bank Trojans, SMS Trojans, and Wireless Application Protocol (WAP) clickers. ## Mobile Malware Attack Real-World Scenarios and Consequences The following are several examples of mobile malware attacks. These cases illustrate specific threats and demonstrate the impact of mobile malware. ### Pegasus Spyware WhatsApp was attacked with Pegasus spyware that exploited a vulnerability in its platform. This Pegasus attack led to the compromised mobile phones of individuals, including business executives and journalists. The malware allowed attackers to intercept encrypted communications and steal sensitive data. ### XcodeGhost In this third-party supply chain attack, several popular apps, including WeChat, were infected when developers unknowingly used a compromised version of Apple's Xcode to build their software. Organizations using these apps were affected as malicious backdoors exposed their data to attackers. ### GriftHorse Trojan The GriftHorse malware was hidden in apps downloaded from the Google Play Store. When users installed these apps, they enrolled in fraudulent premium SMS services, which led to fraudulent charges. ### FluBot Trojan The FluBot Trojan was spread through Smishing attacks. This mobile malware stole passwords and banking information from Android devices. ## Mobile Malware Detection and Prevention Strategies Many tools and techniques are used to detect and prevent mobile malware from infecting devices. The following are several of the most commonly used tactics supported by cybersecurity tools: * [Intrusion Detection Systems (IDS)](https://www.paloaltonetworks.com/cyberpedia/what-is-an-intrusion-detection-system-ids?ts=markdown) * [Intrusion Prevention Systems (IDS)](https://www.paloaltonetworks.com/cyberpedia/what-is-an-intrusion-prevention-system-ips?ts=markdown) * Anti-Malware Tools * [User and Entity Behavior Analytics (UEBA)](https://www.paloaltonetworks.com/cyberpedia/what-is-user-entity-behavior-analytics-ueba?ts=markdown) ### Signature Detection Signature detection identifies mobile malware by looking for unique features of different variants, such as the file hash, the domains, the IP addresses it contacts, and strings within an executable. While signature detection is effective, it cannot identify zero-day threats and evolving malware variants. ### Anomaly Detection [Artificial intelligence (AI)](https://www.paloaltonetworks.com/cyberpedia/artificial-intelligence-ai?ts=markdown) is used to power many anomaly detection tools. These systems start with a model of regular operation and continuously scan for deviations from that model. Anomaly detection is an effective method for identifying novel mobile malware threats. ### Behavioral Detection Like anomaly detection, behavioral detection tools leverage AI and models of normal behavior. Because mobile malware commonly engages in unusual behavior, behavioral detection tools effectively identify potential mobile malware based on device activity. ## Best Practices for Protect Against Mobile Malware Most standard cybersecurity best practices apply to mobile malware. Several best practices specific to mobile malware include the following. ### Use Secure Wi-Fi Using password-protected Wi-Fi connections protects against man-in-the-mobile attacks. Like man-in-the-middle attacks, these attacks take advantage of public networks where threat actors position themselves as users and their intended audience. Threat actors can steal information and direct users to malicious sites by compromising the connection. ### Do Not Jailbreak or Root Mobile Devices Jailbreaking (typically referring to Apple devices) or rooting (typically to Android devices) involves removing software restrictions imposed by the manufacturer to give the user administrator-level access to the operating system. While this enables extensive customization and the ability to install apps unavailable through the official app store, it increases the risk of infection from mobile malware. ### Disable Features when Not in Use Wi-Fi networks and Bluetooth connections are vulnerable points of access for mobile malware. To avoid exploitation by cybercriminals, these features and infrared should be deactivated when not in use. ## Mobile Malware FAQs ### What are mobile malware risks and impacts? Mobile malware presents a number of risks for individuals and organizations with varying degrees of impact. The main risks are data breaches, theft of valuable assets, operational disruption, and compliance violations. The impact of mobile malware attacks includes fiscal losses, reputational damage, and fines due to compliance violations and legal actions. ### What are notable mobile malware attack examples and case studies? * ADB.miner---2018---targeted Android devices with cryptocurrency mining mobile malware * Agent Smith---2019---targeted Android devices and infected over 25 million, replacing legitimate apps with malicious versions without the user's knowledge. * Gooligan---2016---targeted Android devices and infected over 1 million users, stealing their Google account credentials. * Infamous Chisel---2023---targeted Android devices and enabled network monitoring, traffic collection, network backdoor access via The Onion Router (Tor) and Secure Shell (SSH), network scanning, and Secure Copy Protocol (SCP) file transfer. * XcodeGhost---2015---targeted iOS devices, infecting over 4,000 apps, including popular apps such as WeChat. * BlueBorne Attack---2017---exploited Bluetooth vulnerabilities to spread mobile malware across Android and iOS devices. ### What are indications of mobile malware on devices? Several signs of mobile malware are: * Unexpected new apps * Unusual ads or pop-up windows in apps and browser * Poor device performance and freezing or shutting down unexpectedly * Rapid battery drain * Increased data usage * Sporadic data consumption ### How can I protect my mobile device from malware? Use reputable antivirus software, avoid downloading apps from unknown sources, update your device regularly, avoid clicking suspicious links, and be cautious when connecting to public Wi-Fi. ### What should I do if my mobile device is infected with malware? If your device is infected, remove suspicious apps, run a malware scan using security software, reset the device to factory settings if necessary, and update your device to the latest software version. Related content [What Is Smishing? Learn how to identify SMS phishing attempts and how to protect your organization.](https://www.paloaltonetworks.com/cyberpedia/what-is-smishing?ts=markdown) [Unit 42 Retainer Learn how you can put the world-class Unit 42 Incident Response team on speed dial.](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) [2025 Unit 42 Global Incident Response Report Discover the latest threat actor tactics and get expert recommendations to safeguard your organization better.](https://www.paloaltonetworks.com/resources/research/unit-42-incident-response-report?ts=markdown) [Global Marketing Firm Hit by Smishing Attack Unit 42 investigates a smishing campaign turned data breach](https://www.paloaltonetworks.com/customers/global-marketing-company-enlists-unit-42-to-investigate-a-smishing-campaign-turned-data-breach?ts=markdown) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20is%20Mobile%20Malware%3F&body=Stay%20informed%20about%20mobile%20malware%20with%20an%20in-depth%20look%20at%20its%20types%2C%20evolution%2C%20and%20prevention%20tactics.%20Safeguard%20your%20devices%20from%20cyber%20threats.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-is-mobile-malware) Back to Top {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language