Corporate Blogs

Portkey Fortifies Its AI Gateway with the Prisma AIRS Platform

Portkey Fortifies Its AI Gateway with the Prisma AIRS Platform

AI security from Prisma AIRS and Portkey protects your AI apps from threats like prompt injection and data leakage with a simple, one-time setup.
How Apps and Your Phone Can Expose Your Life Without Permission

How Apps and Your Phone Can Expose Your Life Without Permission

Security challenges encompass the entire ecosystem of apps, services and IoT devices that modern consumers use without understanding th...
Jul 22, 2025
A Leader in the 2025 Gartner Magic Quadrant for EPP — 3 Years Running
Unit 42 MDR Recognized as a Leader in MDR, Again

Unit 42 MDR Recognized as a Leader in MDR, Again

Palo Alto Networks Unit 42 MDR Recognized as a Leader in the Frost Radarâ„¢: Global Managed Detection and Response (MDR), 2025.
Jul 16, 2025
The Only Vendor Named a SASE Leader for the Third Time

The Only Vendor Named a SASE Leader for the Third Time

Palo Alto Networks is the only vendor to be named a Leader for the third time in the 2025 Gartner® Magic Quadrant™ for SASE platforms.
Jul 15, 2025
Setting the Standard for Zero Trust Platforms

Setting the Standard for Zero Trust Platforms

Palo Alto Networks is a Leader in The Forrester Waveâ„¢: Zero Trust Platforms, Q3 2025 with the highest score in the Current Offering cat...
Jul 11, 2025
Palo Alto Networks Commitment to Europe

Palo Alto Networks Commitment to Europe

Regulatory frameworks in Europe call for solutions delivering strong cybersecurity, operational resilience and support organization's control over their data.
Jul 09, 2025
Modernizing Cybersecurity for State and Local Government

Modernizing Cybersecurity for State and Local Government

State IT must shift to integrated, efficient and smarter cybersecurity investments, leveraging public/private partnerships for innovation.
Jul 08, 2025

Network Security Blogs

Secure App Traffic with Nutanix Flow & Palo Alto Networks VM-Series

Secure App Traffic with Nutanix Flow & Palo Alto Networks VM-Series

Palo Alto Networks VM-Series and Nutanix Flow secure datacenter application flows to reduce risk & meet compliance goals.
Aug 07, 2025
A Leader in IDC MarketScape for Enterprise Hybrid Firewall Solutions

A Leader in IDC MarketScape for Enterprise Hybrid Firewall Solutions

Palo Alto Networks recognized for offering a unified, AI-powered Zero Trust platform for modern network security.
Aug 06, 2025
How Georgia Department of Transportation Is Building Cyber Resilience

How Georgia Department of Transportation Is Building Cyber Resilience

GDOT boosts network security and resilience with Palo Alto Networks Next-Gen Firewalls. This investment is for public safety and GA transport's future...
Aug 05, 2025
Prisma AIRS on NVIDIA BlueField Secures the Industrial Edge

Prisma AIRS on NVIDIA BlueField Secures the Industrial Edge

Palo Alto Networks is teaming with NVIDIA & Siemens to accelerate zero-trust protection directly to every edge node & minimize risk.
Redefining DNS Protection

Redefining DNS Protection

ADNS leverages Precision AI®, our proprietary AI system combining deep learning, machine learning and generative AI to deliver DNS-layer protection.
Jul 23, 2025
By 
Setting the Standard for Zero Trust Platforms

Setting the Standard for Zero Trust Platforms

Palo Alto Networks is a Leader in The Forrester Waveâ„¢: Zero Trust Platforms, Q3 2025 with the highest score in the Current Offering category.
Jul 11, 2025
A Bold New Vision in Cloud Network Security for the Future of Work

A Bold New Vision in Cloud Network Security for the Future of Work

Palo Alto Networks introduces four groundbreaking innovations to its Software Firewalls portfolio. Find out more.
Jun 25, 2025
Cloud NGFW is Essential for AWS & Azure Cloud Traffic Protection

Cloud NGFW is Essential for AWS & Azure Cloud Traffic Protection

Get unparalleled threat prevention, operational simplicity and significant TCO savings with Cloud NGFW.
Jun 24, 2025

SASE Blogs

Prisma Access Browser Achieves FedRAMP Moderate Authorization

Prisma Access Browser Achieves FedRAMP Moderate Authorization

Prisma Access Browser provides organizations in the U.S. federal government superior browser-based security and controls for any endpoint.
Jul 29, 2025
Reimagine Secure WAN for Harsh Environments with Prisma SD-WAN

Reimagine Secure WAN for Harsh Environments with Prisma SD-WAN

New Prisma SD-WAN ruggedized appliances deliver consistent, secure & high-performance connectivity in even the harshest conditions.
Jul 21, 2025
The Only Vendor Named a SASE Leader for the Third Time

The Only Vendor Named a SASE Leader for the Third Time

Palo Alto Networks is the only vendor to be named a Leader for the third time in the 2025 Gartner® Magic Quadrant™ for SASE platforms.
Jul 15, 2025
Setting the Standard for Zero Trust Platforms

Setting the Standard for Zero Trust Platforms

Palo Alto Networks is a Leader in The Forrester Waveâ„¢: Zero Trust Platforms, Q3 2025 with the highest score in the Current Offering cat...
Jul 11, 2025
Dedicated Data Plane Improves SASE Resilience

Dedicated Data Plane Improves SASE Resilience

Prisma SASE provides a secure, isolated and scalable way to navigate the complexities of digital transformation and the evolving nature of cyberthreats.
Jun 26, 2025
Chart Your SASE Transformation with Prisma SD-WAN

Chart Your SASE Transformation with Prisma SD-WAN

Successful SASE transformations often require balancing both network-led and security-led transformation priorities for a fully integra...
Jun 25, 2025
Examining the Coffee Shop Model and SASE

Examining the Coffee Shop Model and SASE

Although alluring, the coffee shop model doesn't meet enterprise networking & security standards. Consider the Zero Trust Branch model instead.
Jun 11, 2025
A Secure Browser Requires a World-Class Cyber Research Team

A Secure Browser Requires a World-Class Cyber Research Team

If security is your priority, you need a browser built by the best minds in the industry—one that evolves as fast as the threats do.
Jun 04, 2025

Cloud Security Blogs

Don’t Let Inactive AI Models Linger: Reduce Risk and Cost with Cortex Cloud

Don’t Let Inactive AI Models Linger: Reduce Risk and Cost with Cortex Cloud

Reduce risks and costs from inactive AI models. Cortex Cloud's non-intrusive solution provides visibility and helps you clean up unused artifacts.
Aug 11, 2025
Introducing Cortex Cloud ASPM

Introducing Cortex Cloud ASPM

Cortex Cloud ASPM redefines application security with context-aware prevention, unified policy and runtime insight across the full software lifecycle.
Aug 05, 2025
Resilience by Design: Security in the Age of Offensive AI

Resilience by Design: Security in the Age of Offensive AI

Resilience by design is the new imperative in cybersecurity, enabling defenders to contain AI-powered attacks and blunt their impact in the first five minutes.
Aug 01, 2025
What’s New in Cortex Cloud

What’s New in Cortex Cloud

Cloud attack surface management, file integrity monitoring, and Microsoft 365 DSPM lead Cortex Cloud’s innovations to eliminate blind spots and secure data.
Jul 24, 2025
See What Attackers Can Reach in Your Cloud

See What Attackers Can Reach in Your Cloud

Cloud-based data breaches expose high-risk assets to the internet. Learn how to validate, prioritize and remediate external exposure with External Probe Validation.
Jul 21, 2025
AI's Hidden Security Debt

AI's Hidden Security Debt

AI-powered coding assistants introduce security risks by generating flawed code, amplifying vulnerabilities, and undermining developer judgment at scale.
Jul 16, 2025
Overcoming Cloud Security Consolidation Challenges

Overcoming Cloud Security Consolidation Challenges

Cybersecurity: Consolidate 16+ cloud security tools to cut costs, reduce alert fatigue, eliminate visibility gaps, and strengthen your security posture.
Jul 11, 2025
Implementing AI Security with Cortex Cloud AI-SPM

Implementing AI Security with Cortex Cloud AI-SPM

AI security posture management gives CISOs full visibility, safeguards AI data, and blocks prompt injection or model poisoning to speed secure innovation.
Jul 02, 2025

Security Operations Blogs

Cortex XDR Is the Only Endpoint Security Market Leader Certified in Both AVC EDR Detection and Anti-Tampering Tests

Cortex XDR Is the Only Endpoint Security Market Leader Certified in Both AV...

Cortex XDR is the only endpoint security market leader certified in both AV-Comparative EDR Detection and Anti-Tampering tests, proving superior threat detection.
Aug 06, 2025
SE Labs Awards Palo Alto Networks AAA Rating and 100% Prevention Against Ransomware

SE Labs Awards Palo Alto Networks AAA Rating and 100% Prevention Against Ra...

SE Labs awards Palo Alto Networks Cortex XDR a perfect 100% accuracy rating and AAA grade ...
Aug 05, 2025
Think You Have Visibility? Think Again.

Think You Have Visibility? Think Again.

Discover how Cortex XDR & XSIAM's Data Stitching and Smart Grouping unify security data, streamline SecOps, and accelerate threat investigations.
Jul 29, 2025
Security by Design — UX and AI in Modern Cybersecurity

Security by Design — UX and AI in Modern Cybersecurity

Nelson Lee reveals how thoughtful design and emerging AI technologies are reshaping cybersecurity operations from the ground up.
Jul 24, 2025
What’s New for Cortex (July ‘25)

What’s New for Cortex (July ‘25)

The latest release of Cortex harnesses AI to deliver more proactive security, expand visibility, and streamline workflows.
Jul 24, 2025
How Apps and Your Phone Can Expose Your Life Without Permission

How Apps and Your Phone Can Expose Your Life Without Permission

Security challenges encompass the entire ecosystem of apps, services and IoT devices that modern consumers use without understanding th...
Jul 22, 2025
Disrupting Legacy Vulnerability Management

Disrupting Legacy Vulnerability Management

Introducing the general availability of Cortex Exposure Management, a groundbreaking solution that will redefine traditional vulnerabil...
Jul 21, 2025
Cortex Advanced Email Security – Built for Today’s AI Threats

Cortex Advanced Email Security – Built for Today’s AI Threats

Cortex Advanced Email Security uses AI to stop sophisticated phishing, BEC, and GenAI-powe...
Jul 20, 2025

Unit 42 Threat Research

company article

Threat Brief: Operation Lunar Peek, Activity Related to CVE-2024-...

We detail the observed limited activity regarding authentication bypass vulnerability CVE-2024-0012 affecting specific versions of PAN-OS software, and include ...
November 22, 2024
By  Unit 42
company article

New Infection Chain and ConfuserEx-Based Obfuscation for DarkClou...

DarkCloud Stealer's delivery has shifted. We explore three different attack chains that use ConfuserEx obfuscation and a final payload in Visual Basic 6....
company article

Muddled Libra: Why Are We So Obsessed With You?

Muddled Libra gets media attention due to its consistent playbook and unique use of vishing. The group's English fluency is another major factor. ...
August 6, 2025
company article

When Good Accounts Go Bad: Exploiting Delegated Managed Service A...

BadSuccessor is an attack vector in Windows Server 2025. Under certain conditions it allows privilege elevation via dMSAs. We analyze its mechanics. ...
August 6, 2025
company article

Project AK47: Uncovering a Link to the SharePoint Vulnerability A...

Project AK47, a toolset including ransomware, was used to leverage SharePoint exploit chain ToolShell. This activity overlaps with Storm-2603....
August 5, 2025
company article

Threat Actor Groups Tracked by Palo Alto Networks Unit 42 (Update...

A comprehensive list of threat actor groups tracked by Unit 42, along with information such as summaries and industries typically impacted....
August 1, 2025
By  Unit 42
company article

Active Exploitation of Microsoft SharePoint Vulnerabilities: Thre...

Unit 42 has observed active exploitation of recent Microsoft SharePoint vulnerabilities. Here’s how you can protect your organization. ...
July 31, 2025
By  Unit 42
company article

Introducing Unit 42’s Attribution Framework

Peel back the layers on Unit 42's Attribution Framework. We offer a rare inside view into the system used to ultimately assign attribution to threat groups....
July 31, 2025

Subscribe to the Newsletter!

Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.