Corporate Blogs

Radically Simplifying Cybersecurity

Radically Simplifying Cybersecurity

Automate tasks, get guidance and enhance decision-making for faster threat response and improved security posture with Palo Alto Networks copilots.
Oct 15, 2024
Unit 42 Incident Response Retainers Enhance Organizational Resilience

Unit 42 Incident Response Retainers Enhance Organizational Resilience

Examine two Unit 42 incident response cases that provide valuable insights into how today’s threat landscape evolves and the strategies needed against it.
Sep 26, 2024
A Leader in the 2024 Gartner Magic Quadrant for EPP

A Leader in the 2024 Gartner Magic Quadrant for EPP

Palo Alto Networks was named a leader in endpoint protection platforms by Gartner for Cortex XDR.
Sep 25, 2024
Forrester Names Palo Alto Networks a Leader in Attack Surface Management

Forrester Names Palo Alto Networks a Leader in Attack Surface Management

Palo Alto Networks was named a leader in attack surface management by Forrester for Cortex Xpanse.
Sep 24, 2024
By 
The Hidden AI Risk Lurking In Your Business

The Hidden AI Risk Lurking In Your Business

The adoption of unsanctioned GenAI applications can lead to a broad range of cybersecurity issues, from data leakage to malware.
Sep 19, 2024
Using Time in Your Favor During a Ransomware Attack

Using Time in Your Favor During a Ransomware Attack

For organizations to overcome ransomware attacks, buying time can change the balance of power and set you up for a more successful resolution.
Sep 10, 2024
Crush It, Don’t Get Crushed — Combat SOC Analyst Burnout with AI
Join SASE Converge — Where the Future of SASE Comes Together

Join SASE Converge — Where the Future of SASE Comes Together

Join us for SASE Converge 2024, a 2-hour immersive virtual experience, featuring thought leaders and technologists from across the globe.
Aug 27, 2024

Network Security Blogs

Strata Copilot is Here

Strata Copilot is Here

Announcing the availability of Strata Copilot, the ultimate AI assistant for Network Security.
Oct 15, 2024
Secure AI Applications by Design. AI Runtime Security, Now Available.

Secure AI Applications by Design. AI Runtime Security, Now Available.

Secure your AI applications, models and data from new set of AI threats.
Oct 11, 2024
Boost Cloud Security with Cloud NGFW: Achieve 163% ROI & More

Boost Cloud Security with Cloud NGFW: Achieve 163% ROI & More

Discover how Palo Alto Networks' Cloud NGFW offers 163% ROI, improved visibility, control, and security for AWS and Azure cloud environments.
Oct 10, 2024
How Network Security Platformization Paid Off with 174% ROI

How Network Security Platformization Paid Off with 174% ROI

Cybersecurity platformization can pay off for your organization in numerous ways, getting a 174% return on investment and realizing a NPV of $26.2 mil...
Oct 09, 2024
A Leader in 2024 Forrester Enterprise Firewall Solutions Wave

A Leader in 2024 Forrester Enterprise Firewall Solutions Wave

Palo Alto Networks has been named a Leader in the Forrester Wave™: Enterprise Firewall Solutions, Q4 2024 report.
Oct 03, 2024
Palo Alto Networks Prevents Data Loss at Enterprise Scale with NVIDIA

Palo Alto Networks Prevents Data Loss at Enterprise Scale with NVIDIA

The integration of NVIDIA Triton Inference Server and GPU technology into Palo Alto Networks Data Security advances hand...
Oct 01, 2024
Secure AI Access by Design — Enabling Safe Usage of GenAI Apps

Secure AI Access by Design — Enabling Safe Usage of GenAI Apps

AI Access Security harnesses the power of GenAI technologies, maintains robust protection for sensitive data, ensures compliance with security policies.
Aug 15, 2024
Risk-based vulnerability prioritization for IoT, OT and MIoT devices

Risk-based vulnerability prioritization for IoT, OT and MIoT devices

CVSS base scores don't consider the threat landscape and your business context. We recommend using a risk-based approach to prioritize CVEs instead.
Jul 25, 2024

SASE Blogs

The Future of AI Security: Three Trends Every Executive Should Watch

The Future of AI Security: Three Trends Every Executive Should Watch

Read this blog to explore three key trends shaping the future of AI security that every executive should watch closely.
Oct 10, 2024
Strata Copilot is Here

Strata Copilot is Here

Announcing the availability of Strata Copilot, the ultimate AI assistant for Network Security.
Oct 15, 2024
Palo Alto Networks: 5x Leader in the Gartner Magic Quadrant for SD-WAN

Palo Alto Networks: 5x Leader in the Gartner Magic Quadrant for SD-WAN

Palo Alto Networks is named a Leader five-times in a row with furthest on completeness of ...
Oct 04, 2024
Securing Data at the Last Mile with Endpoint DLP

Securing Data at the Last Mile with Endpoint DLP

Endpoint DLP protects from accidental data exposure & intentional exfiltration via USB removable media, printers, & network shares.
Oct 02, 2024
Palo Alto Networks Prevents Data Loss at Enterprise Scale with NVIDIA
Palo Alto Networks & Dell Join Forces for a Modern SD-WAN Solution

Palo Alto Networks & Dell Join Forces for a Modern SD-WAN Solution

Palo Alto Networks and Dell Technologies are partnering to address the challenges of legacy networking and SD-WAN solutions that have f...
Sep 24, 2024
By 
ADEM Intelligent Path Detection Offers Seamless User Experience

ADEM Intelligent Path Detection Offers Seamless User Experience

ADEM Intelligent Path Detection provides IT teams with the tools to analyze diverse network paths for users accessing business-critical...
Sep 18, 2024
Simplify Cloud Networking with Prisma SD-WAN & Megaport MVE

Simplify Cloud Networking with Prisma SD-WAN & Megaport MVE

Find out how this integration provides agility, robust security & simplified connectivity for distributed, cloud-first global networks....
Sep 17, 2024

Cloud Native Security Blogs

Tame Complexity, Turbocharge Security: Prisma Cloud Copilot

Tame Complexity, Turbocharge Security: Prisma Cloud Copilot

Enhance your cloud security with AI-driven analysis, insights and automation. Simplify threat detection, vulnerability management, and compliance for ...
Oct 15, 2024
Securing Amazon SageMaker: Attack Surface Explained

Securing Amazon SageMaker: Attack Surface Explained

Reduce your attack surface and improve your cloud and AI service security practices with a collaborative tutorial from Palo Alto Networks and Amazon SageMaker’s team.
Oct 09, 2024
Prisma Cloud Innovations: September's Highlights

Prisma Cloud Innovations: September's Highlights

Prisma Cloud has one new announcement and six new features to highlight for you from our latest September 2024 product release.
Oct 07, 2024
Taking an Application-Centric Approach to Cloud Security

Taking an Application-Centric Approach to Cloud Security

AppDNA enhances risk classification in cloud-native environments and offers application-level insights to streamline risk prioritization and remediation.
Oct 04, 2024
Reduce Your Risk with the Kubernetes CIS Benchmark and Prisma Cloud

Reduce Your Risk with the Kubernetes CIS Benchmark and Prisma Cloud

Secure your entire Kubernetes environment, as Prisma Cloud provides checks that validate recommendations in the Kubernetes CIS Benchmark.
Sep 30, 2024
Stories from the Darkside: A Set of Stolen Access Keys and a Complete Cloud Takeover

Stories from the Darkside: A Set of Stolen Access Keys and a Complete Cloud...

Cloud security requires vigilance. Learn how this attack exploited common misconfigurations and discover proactive measures to protect your environment.
Sep 26, 2024
Breaking Down the Biggest Threats to Your Cloud Environment

Breaking Down the Biggest Threats to Your Cloud Environment

Discover top insights from the 2024 Unit 42 Incident Response Report on evolving cloud threats, AI's impact, and best practices for securing your clou...
Sep 24, 2024
4 Reasons to Implement Multitenancy in Your Cloud Security Strategy

4 Reasons to Implement Multitenancy in Your Cloud Security Strategy

Multitenancy: Explore 4 reasons to embed multitenancy into your cloud security strategy for compliance, data isolation, cost tracking, and management ...
Sep 19, 2024

Security Operations Blogs

Cortex Copilot - Another Step Forward in SOC Transformation

Cortex Copilot - Another Step Forward in SOC Transformation

Discover how Cortex Copilot, an AI-powered security assistant, transforms SOC operations by speeding up investigations and optimizing analyst workflow...
Oct 15, 2024

Bye Whack-a-Mole: The New Cortex Generic Persistence Analytics Module

Discover Palo Alto Networks' new Generic Persistence Analytics module, detecting malware persistence across techniques for enhanced cyb...
Oct 10, 2024
Introducing Cortex Canvas: Unleashing the Power of Visual Storytelling

Introducing Cortex Canvas: Unleashing the Power of Visual Storytelling

Discover Cortex Canvas: Visualize cyber incidents, enhance threat hunting, and boost SOC collaboration with dynamic attack diagrams.
Oct 09, 2024
Cortex XSOAR Ranked #1 for SOC Automation

Cortex XSOAR Ranked #1 for SOC Automation

Ranked Overall Leader in 2024 Kuppinger Cole SOAR leadership compass
Oct 08, 2024
By 
Boosting Identity Security with Cortex XDR/XSIAM Honey Users

Boosting Identity Security with Cortex XDR/XSIAM Honey Users

Learn how Cortex XDR’s Identity Threat Detection and Response (ITDR) leverages honey users to enhance identity security by detecting and deceiving attackers.
Oct 06, 2024
Leading with a Prevention-First Approach for Cloud Detection and Response

Leading with a Prevention-First Approach for Cloud Detection and Response

Discover the power of a prevention-first approach in cloud detection and response. Learn how agent-based solutions provide real-time visibility and control.
Sep 27, 2024
A Leader in the 2024 Gartner Magic Quadrant for EPP

A Leader in the 2024 Gartner Magic Quadrant for EPP

Palo Alto Networks was named a leader in endpoint protection platforms by Gartner for Cortex XDR.
Sep 25, 2024
Expanded Coverage of Attack Surface Risks with Cortex Xpanse

Expanded Coverage of Attack Surface Risks with Cortex Xpanse

Xpanse 2.7 introduces powerful new features to help security teams actively identify and remediate hidden risks across their ever-expanding attack surface. Discover enhanced scanni...
Sep 24, 2024

Unit 42 Threat Research

company article

Lynx Ransomware: A Rebranding of INC Ransomware

Discover recent attacks using Lynx ransomware, a rebrand of INC, targeting multiple crucial sectors in the U.S. and UK with prevalent double-extortion tactics....
company article

Contagious Interview: DPRK Threat Actors Lure Tech Industry Job S...

Discover how North Korean attackers, posing as recruiters, used an updated downloader and backdoor in a campaign targeting tech job seekers....
October 9, 2024
By  Unit 42
company article

No Way to Hide: Uncovering New Campaigns from Daily Tunneling Det...

Four DNS tunneling campaigns identified through a new machine learning tool expose intricate tactics when targeting vital sectors like finance, healthcare and m...
October 4, 2024
company article

Detecting Vulnerability Scanning Traffic From Underground Tools U...

Researchers detail the discovery of Swiss Army Suite, an underground tool used for SQL injection scans discovered with a machine learning model....
company article

Unraveling Sparkling Pisces’s Tool Set: KLogEXE and FPSpy

We analyze new tools DPRK-linked APT Sparkling Pisces (aka Kimsuky) used in cyberespionage campaigns: KLogExe (a keylogger) and FPSpy (a backdoor variant)....
September 26, 2024
company article

Investigating Infrastructure and Tactics of Phishing-as-a-Service...

Delve into the infrastructure and tactics of phishing platform Sniper Dz, which targets popular brands and social media. We discuss its unique aspects and more....
September 24, 2024
company article

Inside SnipBot: The Latest RomCom Malware Variant

We deconstruct SnipBot, a variant of RomCom malware. Its authors, who target diverse sectors, seem to be aiming for espionage instead of financial gain. ...
September 23, 2024
company article

Discovering Splinter: A First Look at a New Post-Exploitation Red...

Discover Splinter, a new post-exploitation tool with advanced features like command execution and file manipulation, detected by Unit 42 researchers. ...
September 19, 2024

Subscribe to the Newsletter!

Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.