Corporate Blogs

Automation in Action — How 3 Customers Revolutionized SecOps with XSOAR

Automation in Action — How 3 Customers Revolutionized SecOps with XSOAR

See how three of Palo Alto Networks customers across various industries and regions are leveraging Cortex XSOAR.
Nov 20, 2024
Shaking Up Security — The Power of AI-Native SOCs

Shaking Up Security — The Power of AI-Native SOCs

Discover how AI-native SOCs revolutionize cybersecurity, reducing alert fatigue and improving threat detection. Transform your security operations with AI.
Nov 06, 2024
Top Three Ways Organizations Were Unprepared for Cyberattacks in 2023

Top Three Ways Organizations Were Unprepared for Cyberattacks in 2023

2024 Incident Response report reveals top three ways organizations were unprepared for cyb...
Nov 05, 2024
Banking on AI to Defend the Financial Services Sector

Banking on AI to Defend the Financial Services Sector

Discover how financial institutions leverage AI to combat cyberthreats, enhance fraud detection, and streamline operations. Learn about FinTech security.
Oct 31, 2024
Securing AI Infrastructure for a More Resilient Future

Securing AI Infrastructure for a More Resilient Future

Governments that are actively developing broad, risk-based, AI regulatory frameworks have concurrently established AI safety institutes...
Oct 30, 2024
Democratising Cybersecurity

Democratising Cybersecurity

Palo Alto Networks and BT combine our best-in-class firewalls with BT’s top-tier Managed Security Services.
Oct 23, 2024
Cloud Security — Maturing Past the Awkward Teenage Years

Cloud Security — Maturing Past the Awkward Teenage Years

Explore cloud security's maturation, common misconceptions, and best practices for robust cloud defenses.
Oct 22, 2024
Safeguard OT Environments with the Power of Precision AI

Safeguard OT Environments with the Power of Precision AI

New capabilities safeguard OT remote operations, mitigate risks for hard-to-patch assets, and extend protection into industrial environ...
Oct 21, 2024

Network Security Blogs

Empower Developers to Secure AI Applications Through Code

Empower Developers to Secure AI Applications Through Code

Developers can now secure their AI applications with a few lines of code. Read the AI Runtime Security API intercept announcement.
Nov 19, 2024
Exceptional User Experience — Every Application, Every Transaction

Exceptional User Experience — Every Application, Every Transaction

Palo Alto Networks ADEM empowers IT teams and optimizes productivity with visibility into users, branch sites, apps and IT infrastructure.
Nov 12, 2024
Strata Cloud Manager: One Interface, Complete Network Security Control

Strata Cloud Manager: One Interface, Complete Network Security Control

Strata Cloud Manager offers AIOps, Digital Experience Management (DEM), and management capabilities in a single, cohesiv...
Nov 07, 2024
Safeguard OT Environments with the Power of Precision AI

Safeguard OT Environments with the Power of Precision AI

New capabilities safeguard OT remote operations, mitigate risks for hard-to-patch assets, and extend protection into industrial environments.
Oct 21, 2024
The Future of Shopping: How Smart Stores are Transforming Retail

The Future of Shopping: How Smart Stores are Transforming Retail

Discover how IoT and smart stores are transforming retail with enhanced experiences and efficiency, while ensuring security with Palo Alto Networks.
Oct 17, 2024
Strata Copilot is Here

Strata Copilot is Here

Announcing the availability of Strata Copilot, the ultimate AI assistant for Network Security.
Oct 15, 2024
Secure AI Applications by Design. AI Runtime Security, Now Available.

Secure AI Applications by Design. AI Runtime Security, Now Available.

Secure your AI applications, models and data from new set of AI threats.
Oct 11, 2024
Boost Cloud Security with Cloud NGFW: Achieve 163% ROI & More

Boost Cloud Security with Cloud NGFW: Achieve 163% ROI & More

Discover how Palo Alto Networks' Cloud NGFW offers 163% ROI, improved visibility, control, and security for AWS and Azure cloud environments.
Oct 10, 2024

SASE Blogs

Secure Browsing Demands More Than Extensions

Secure Browsing Demands More Than Extensions

Organizations need an enterprise browser and a security-focused browser extension to protect data and secure unmanaged devices. Read more.
Nov 14, 2024
Exceptional User Experience — Every Application, Every Transaction

Exceptional User Experience — Every Application, Every Transaction

Palo Alto Networks ADEM empowers IT teams and optimizes productivity with visibility into users, branch sites, apps and IT infrastructure.
Nov 12, 2024
Operational Resilience: Ensuring Business Continuity with Prisma SASE

Operational Resilience: Ensuring Business Continuity with Prisma SASE

Operational resilience in Prisma SASE helps companies run with the highest levels of relia...
Nov 11, 2024
Strata Cloud Manager: One Interface, Complete Network Security Control
Privileged Remote Access and the Power of the Browser

Privileged Remote Access and the Power of the Browser

Read our latest blogs to learn how unified security for a fragmented workforce is achieved through SSH, RDP, and the enterprise browser.
Oct 18, 2024
Strata Copilot is Here

Strata Copilot is Here

Announcing the availability of Strata Copilot, the ultimate AI assistant for Network Security.
Oct 15, 2024
The Future of AI Security: Three Trends Every Executive Should Watch

The Future of AI Security: Three Trends Every Executive Should Watch

Read this blog to explore three key trends shaping the future of AI security that every executive should watch closely.
Oct 10, 2024
Palo Alto Networks: 5x Leader in the Gartner Magic Quadrant for SD-WAN

Palo Alto Networks: 5x Leader in the Gartner Magic Quadrant for SD-WAN

Palo Alto Networks is named a Leader five-times in a row with furthest on completeness of ...
Oct 04, 2024

Cloud Native Security Blogs

Experience Next-Generation Cloud Security at AWS re:Invent 2024

Experience Next-Generation Cloud Security at AWS re:Invent 2024

Join Prisma Cloud by Palo Alto Networks at AWS re:Invent 2024 in Las Vegas for AI security sessions, in-booth theaters, JAM sessions and demos at booth #1124.
Nov 19, 2024
Data Security, Meet Remediation: Introducing the New Integration Between Prisma Cloud DSPM and Cortex XSOAR

Data Security, Meet Remediation: Introducing the New Integration Between Pr...

Data Security: New Prisma Cloud DSPM & Cortex XSOAR integration automates remediation, enhancing security and governance in diverse cloud environments...
Nov 06, 2024
Shifting Security Left with Prisma Cloud and HashiCorp Packer

Shifting Security Left with Prisma Cloud and HashiCorp Packer

Use Prisma Cloud to secure Packer images by HashiCorp and protect your entire CI/CD pipeline with comprehensive compliance support.
Nov 01, 2024
GigaOm Recognizes Prisma Cloud as a CNAPP Leader

GigaOm Recognizes Prisma Cloud as a CNAPP Leader

CNAPP: Prisma Cloud leads the pack in GigaOm's inaugural CNAPP Radar report, excelling in key features like CIEM, risk prioritization and resource behavior monitoring.
Oct 29, 2024
Shift Left: Should You Push It or Pull It?

Shift Left: Should You Push It or Pull It?

Shift left with code to cloud strategies integrating protection at every stage, mitigate risks, enhance developer workflows, and secure production environments.
Oct 24, 2024
Understanding the Costs and Benefits of DSPM Tools

Understanding the Costs and Benefits of DSPM Tools

Discover the costs and benefits of DSPM tools, including deployment considerations, cost components, security value, and potential cloud cost savings.
Oct 16, 2024
Tame Complexity, Turbocharge Security: Prisma Cloud Copilot

Tame Complexity, Turbocharge Security: Prisma Cloud Copilot

Enhance your cloud security with AI-driven analysis, insights and automation. Simplify threat detection, vulnerability management, and compliance for ...
Oct 15, 2024
Securing Amazon SageMaker: Attack Surface Explained

Securing Amazon SageMaker: Attack Surface Explained

Reduce your attack surface and improve your cloud and AI service security practices with a collaborative tutorial from Palo Alto Networks and Amazon SageMaker’s team.
Oct 09, 2024

Security Operations Blogs

Automation in Action — How 3 Customers Revolutionized SecOps with XSOAR

Automation in Action — How 3 Customers Revolutionized SecOps with XSOAR

See how three of Palo Alto Networks customers across various industries and regions are leveraging Cortex XSOAR.
Nov 20, 2024
Identify 60 Additional Server Protocols with Cortex Xpanse

Identify 60 Additional Server Protocols with Cortex Xpanse

Discover how Cortex Xpanse now identifies 60 additional server protocols in your attack surface, protecting against emerging threats across proxy, network, and database servers.
Nov 12, 2024
By 
Optimize Analyst Workflows with Cortex Copilot

Optimize Analyst Workflows with Cortex Copilot

Discover how Cortex Copilot streamlines security analyst workflows, reduces burnout, and accelerates incident investigations by leveraging AI to automate mundane tasks.
Nov 07, 2024
Shaking Up Security — The Power of AI-Native SOCs

Shaking Up Security — The Power of AI-Native SOCs

Discover how AI-native SOCs revolutionize cybersecurity, reducing alert fatigue and improving threat detection. Transform your security operations with AI.
Nov 06, 2024
Banking on AI to Defend the Financial Services Sector

Banking on AI to Defend the Financial Services Sector

Discover how financial institutions leverage AI to combat cyberthreats, enhance fraud detection, and streamline operations. Learn about FinTech security.
Oct 31, 2024
Cloud Security — Maturing Past the Awkward Teenage Years

Cloud Security — Maturing Past the Awkward Teenage Years

Explore cloud security's maturation, common misconceptions, and best practices for robust cloud defenses.
Oct 22, 2024
Cutting Through the Noise: Simplifying SIEM Alerts with Cortex

Cutting Through the Noise: Simplifying SIEM Alerts with Cortex

Discover how integrating Cortex XSOAR with Splunk SIEM reduces false positives, automates alert triage, and enhances cybersecurity effi...
Oct 16, 2024
Cortex Copilot - Another Step Forward in SOC Transformation

Cortex Copilot - Another Step Forward in SOC Transformation

Discover how Cortex Copilot, an AI-powered security assistant, transforms SOC operations by speeding up investigations and optimizing a...
Oct 15, 2024
By 

Unit 42 Threat Research

company article

Threat Brief: Operation Lunar Peek, Activity Related to CVE-2024-...

We detail the observed limited activity regarding authentication bypass vulnerability CVE-2024-0012 affecting specific versions of PAN-OS software, and include ...
November 19, 2024
By  Unit 42
company article

FrostyGoop’s Zoom-In: A Closer Look into the Malware Artifacts, B...

We analyze FrostyGoop malware, which targets OT systems. This article walks through newly discovered samples, indicators, and also examines configurations and n...
November 19, 2024
company article

Fake North Korean IT Worker Linked to BeaverTail Video Conference...

North Korean IT worker cluster CL-STA-0237 instigated phishing attacks via video apps in Laos, exploiting U.S. IT firms and major tech identities....
November 14, 2024
By  Unit 42
company article

Global Companies Are Unknowingly Paying North Koreans: Here’s How...

We discuss North Korea's use of IT workers to infiltrate companies, detailing detection strategies like IT asset management and IP analysis to counter this....
November 13, 2024
company article

ModeLeak: Privilege Escalation to LLM Model Exfiltration in Verte...

New research reveals two vulnerabilities in Google's Vertex AI that may lead to privilege escalation or data theft through custom jobs or malicious models....
November 12, 2024
company article

Silent Skimmer Gets Loud (Again)

We discuss a new campaign from the cybercrime group behind Silent Skimmer, showcasing the exploit of Telerik UI vulnerabilities and malware like RingQ loader....
November 7, 2024
company article

Automatically Detecting DNS Hijacking in Passive DNS

Explore how we detect DNS hijacking by analyzing millions of DNS records daily, using machine learning to identify redirect attempts to malicious servers....
company article

TA Phone Home: EDR Evasion Testing Reveals Extortion Actor's Tool...

A threat actor attempted to use an AV/EDR bypass tool in an extortion attempt. Instead, the tool provided Unit 42 insight into the threat actor....
November 1, 2024

Subscribe to the Newsletter!

Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.