The Palo Alto Networks threat research team, Unit 42, has spent the last seven months investigating a series of attacks, determining that they are the result of a long-standing cyber espionage campaign. The campaign, which we refer to as “Scarlet Mimic,” has activity dating back over four years. The result of our analysis has allowed us to connect a series of disparate attacks into a coherent picture of the Scarlet Mimic operation, which has targeted human rights activists, as well as organizations with knowledge about these groups, including government entities.

Read the full report - Blog
Read the full report - PDF
Read the Executive Advisory Report report - PDF


Product Summary Specsheet

Key features, performance capacities and specifications for all Palo Alto Networks firewalls.

  • 73
  • 197163

2018 Predictions & Recommendations: Automated Threat Response Technology in OT Grows Up

Automated threat response, which we’ll simply refer to as ATR, is the process of automating the action taken on detected cyber incidents, particularly those deemed malicious or anomalous. For each type of incident, there is a predefined action for containment or prevention where newer technologies, such as behavioral analytics and artificial intelligence, are utilized to bring incidents of interest to the surface.

  • 4
  • 26236

PA-5200 Series Datasheet

Key features, performance capacities and specifications for our PA-5200 Series.

  • 7
  • 57428

PA-800 Series Datasheet

Palo Alto Networks PA-800 Series next-generation firewall appliances are designed to secure enterprise branch offices and midsized businesses.

  • 10
  • 58030

PA-220 Datasheet

Palo Alto Networks PA-220 brings next-generation firewall capabilities to distributed enterprise branch offices and retail locations.

  • 13
  • 51653

PA-3000 Series Specsheet

Key features, performance capacities and specifications of the Palo Alto Networks PA-3000 Series.

  • 18
  • 88531