Leveraging Rubrik in Cortex XSOARRubrik and Cortex XSOAR are excited to share that the new Rubrik Polaris content pack and integration is now available w...
Shining a Light on Log4j Exploit PayloadsCortex XDR Managed Threat Hunting deep-dive into rarely seen payloads attackers have attempted to execute using the Log4...
Regulatory frameworks in Europe call for solutions delivering strong cybersecurity, operational resilience and support organization's control over their data.
GDOT boosts network security and resilience with Palo Alto Networks Next-Gen Firewalls. This investment is for public safety and GA transport's future...
Prisma SASE provides a secure, isolated and scalable way to navigate the complexities of digital transformation and the evolving nature of cyberthreats.
Resilience by design is the new imperative in cybersecurity, enabling defenders to contain AI-powered attacks and blunt their impact in the first five minutes.
Cloud attack surface management, file integrity monitoring, and Microsoft 365 DSPM lead Cortex Cloud’s innovations to eliminate blind spots and secure data.
Cloud-based data breaches expose high-risk assets to the internet. Learn how to validate, prioritize and remediate external exposure with External Probe Validation.
AI security posture management gives CISOs full visibility, safeguards AI data, and blocks prompt injection or model poisoning to speed secure innovation.
Cortex XDR is the only endpoint security market leader certified in both AV-Comparative EDR Detection and Anti-Tampering tests, proving superior threat detection.
We detail the observed limited activity regarding authentication bypass vulnerability CVE-2024-0012 affecting specific versions of PAN-OS software, and include ...
DarkCloud Stealer's delivery has shifted. We explore three different attack chains that use ConfuserEx obfuscation and a final payload in Visual Basic 6....
BadSuccessor is an attack vector in Windows Server 2025. Under certain conditions it allows privilege elevation via dMSAs. We analyze its mechanics. ...
Peel back the layers on Unit 42's Attribution Framework. We offer a rare inside view into the system used to ultimately assign attribution to threat groups....
Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.
Get the latest news, invites to events, and threat alerts