* [Blog](https://origin-researchcenter.paloaltonetworks.com/blog) * [Palo Alto Networks](https://origin-researchcenter.paloaltonetworks.com/blog/corporate) * Adobe Flash # Palo Alto Networks ## Adobe Flash [![Fake Flash Updaters Push Cryptocurrency Miners](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2018/04/unit42-blog-600x300.jpg)](https://origin-researchcenter.paloaltonetworks.com/blog/2018/10/unit42-fake-flash-updaters-push-cryptocurrency-miners/) [Fake Flash Updaters Push Cryptocurrency Miners \----------------------------------------------](https://origin-researchcenter.paloaltonetworks.com/blog/2018/10/unit42-fake-flash-updaters-push-cryptocurrency-miners/) Unit 42 investigates a recent Fake Flash update pushing cryptocurrency mining software. Get the full report. [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) Oct 11, 2018 By [Brad Duncan](https://www.paloaltonetworks.com/blog/author/bduncan/?ts=markdown "Posts by Brad Duncan") ## Palo Alto Networks *** ** * ** *** [Announcements](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown) *** ** * ** *** [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown) *** ** * ** *** [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) *** ** * ** *** [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) *** ** * ** *** [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) *** ** * ** *** [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown) *** ** * ** *** ![Palo Alto Networks News of the Week – June 10, 2017](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2016/11/blog-generic-banner-1.jpg) [News of the Week](https://www.paloaltonetworks.com/blog/category/news-of-the-week/?ts=markdown) ## [Palo Alto Networks News of the Week -- June 10, 2017](https://origin-researchcenter.paloaltonetworks.com/blog/2017/06/palo-alto-networks-news-week-june-10-2017/) Catch up on all the top Palo Alto Networks news of the week. Jun 10, 2017 By [Justin Hall](https://www.paloaltonetworks.com/blog/author/justin-hall/?ts=markdown "Posts by Justin Hall") ![Palo Alto Networks News of the Week – June 3, 2017](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2016/11/blog-generic-banner-1.jpg) [News of the Week](https://www.paloaltonetworks.com/blog/category/news-of-the-week/?ts=markdown) ## [Palo Alto Networks News of the Week -- June 3, 2017](https://origin-researchcenter.paloaltonetworks.com/blog/2017/06/palo-alto-networks-news-week-june-3-2017/) Catch up on all the top Palo Alto Networks news of the week. Jun 03, 2017 By [Justin Hall](https://www.paloaltonetworks.com/blog/author/justin-hall/?ts=markdown "Posts by Justin Hall") ![Palo Alto Networks Unit 42 Vulnerability Research May 2017 Disclosures](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2016/09/unit42-web-banner-650x300.jpg) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Palo Alto Networks Unit 42 Vulnerability Research May 2017 Disclosures](https://origin-researchcenter.paloaltonetworks.com/blog/2017/06/unit42-palo-alto-networks-unit-42-vulnerability-research-may-2017-disclosures/) Unit 42 researcher uncovers two new Adobe Flash Vulnerabilities. Jun 01, 2017 By [Christopher Budd](https://www.paloaltonetworks.com/blog/author/christopher-budd/?ts=markdown "Posts by Christopher Budd") ![Pulling the Brake on the Magnitude EK Train](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2016/09/unit42-web-banner-650x300.jpg) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Pulling the Brake on the Magnitude EK Train](https://origin-researchcenter.paloaltonetworks.com/blog/2017/04/unit42-pulling-brake-magnitude-ek-train/) Unit 42 identifies malicious sites associated with the Magnitude Exploit Kit. Apr 13, 2017 By [Jeff White](https://www.paloaltonetworks.com/blog/author/jeff-white/?ts=markdown "Posts by Jeff White") ![Palo Alto Networks Unit 42 Vulnerability Research March 2017 Disclosures](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2016/09/unit42-web-banner-650x300.jpg) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Palo Alto Networks Unit 42 Vulnerability Research March 2017 Disclosures](https://origin-researchcenter.paloaltonetworks.com/blog/2017/03/unit42-palo-alto-networks-unit-42-vulnerability-research-march-2017-disclosures/) Unit 42 researcher Tao Yan discovered three new Adobe Flash vulnerabilities. Mar 16, 2017 By [Christopher Budd](https://www.paloaltonetworks.com/blog/author/christopher-budd/?ts=markdown "Posts by Christopher Budd") ![Palo Alto Networks Unit 42 Vulnerability Research February 2017 Disclosures](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2016/09/unit42-web-banner-650x300.jpg) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Palo Alto Networks Unit 42 Vulnerability Research February 2017 Disclosures](https://origin-researchcenter.paloaltonetworks.com/blog/2017/03/unit-42-palo-alto-networks-unit-42-vulnerability-research-february-2017-disclosures/) Palo Alto Networks researcher Tao Yan discovers two new Adobe Flash Vulnerabilities. Mar 03, 2017 By [Christopher Budd](https://www.paloaltonetworks.com/blog/author/christopher-budd/?ts=markdown "Posts by Christopher Budd") ![Palo Alto Networks Unit 42 Vulnerability Research December 2016 Disclosures](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2016/09/unit42-web-banner-650x300.jpg) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Palo Alto Networks Unit 42 Vulnerability Research December 2016 Disclosures](https://origin-researchcenter.paloaltonetworks.com/blog/2016/12/unit42-palo-alto-networks-unit-42-vulnerability-research-december-2016-disclosures/) As part of Unit 42's ongoing threat research, we can now disclose that Palo Alto Networks Unit 42 researchers have reported six vulnerabilities that have been fixed by Apple, Adobe... Dec 16, 2016 By [Christopher Budd](https://www.paloaltonetworks.com/blog/author/christopher-budd/?ts=markdown "Posts by Christopher Budd") ![Palo Alto Networks News of the Week – October 22, 2016](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2015/10/blog-generic-banner.jpg) [News of the Week](https://www.paloaltonetworks.com/blog/category/news-of-the-week/?ts=markdown) ## [Palo Alto Networks News of the Week -- October 22, 2016](https://origin-researchcenter.paloaltonetworks.com/blog/2016/10/palo-alto-networks-news-week-october-22-2016/) Did you miss any of this week's Palo Alto Networks action? Don't worry, we've rounded up the top news right here. Oct 22, 2016 By [Justin Hall](https://www.paloaltonetworks.com/blog/author/justin-hall/?ts=markdown "Posts by Justin Hall") [](https://origin-researchcenter.paloaltonetworks.com/blog/2016/09/unit42-palo-alto-networks-researcher-discovers-eight-critical-vulnerabilities-in-adobe-flash-player/) [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown), [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Palo Alto Networks Researcher Discovers Eight Critical Vulnerabilities in A...](https://origin-researchcenter.paloaltonetworks.com/blog/2016/09/unit42-palo-alto-networks-researcher-discovers-eight-critical-vulnerabilities-in-adobe-flash-player/) Palo Alto Networks was recently credited with the discovery of eight new vulnerabilities affecting Adobe Flash Player. Sep 19, 2016 By [Ryan Olson](https://www.paloaltonetworks.com/blog/author/ryan-olson/?ts=markdown "Posts by Ryan Olson") [](https://origin-researchcenter.paloaltonetworks.com/blog/2016/01/new-attacks-linked-to-c0d0s0-group/) [Malware](https://www.paloaltonetworks.com/blog/category/malware-2/?ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown), [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [New Attacks Linked to C0d0so0 Group](https://origin-researchcenter.paloaltonetworks.com/blog/2016/01/new-attacks-linked-to-c0d0s0-group/) While recently researching unknown malware and attack campaigns using the AutoFocus threat intelligence platform, Unit 42 discovered new activity that appears related to an adversary group previously called "C0d0so0" or "Codoso". This group... Jan 22, 2016 By [Josh Grunzweig](https://www.paloaltonetworks.com/blog/author/josh-grunzweig/?ts=markdown "Posts by Josh Grunzweig") and [Bryan Lee](https://www.paloaltonetworks.com/blog/author/bryan-lee/?ts=markdown "Posts by Bryan Lee") [](https://origin-researchcenter.paloaltonetworks.com/blog/2015/10/back-to-the-future-you-dont-need-a-time-machine-to-prevent-previously-unknown-endpoint-threats/) [Endpoint](https://www.paloaltonetworks.com/blog/category/endpoint-2/?ts=markdown) ## [Back to the Future: You Don't Need a Time Machine to Prevent Previously Unk...](https://origin-researchcenter.paloaltonetworks.com/blog/2015/10/back-to-the-future-you-dont-need-a-time-machine-to-prevent-previously-unknown-endpoint-threats/) Today is Back to the Future day, and the date above, as all fans of the iconic movie know, is what was programmed into the DeLorean time machine. The concept of time travel has lon... Oct 21, 2015 By [Sebastian Goodwin](https://www.paloaltonetworks.com/blog/author/sebastian-goodwin/?ts=markdown "Posts by Sebastian Goodwin") [](https://origin-researchcenter.paloaltonetworks.com/blog/2015/07/ups-observations-on-cve-2015-3113-prior-zero-days-and-the-pirpi-payload/) [Malware](https://www.paloaltonetworks.com/blog/category/malware-2/?ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown), [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [UPS: Observations on CVE-2015-3113, Prior Zero-Days and the Pirpi Payload](https://origin-researchcenter.paloaltonetworks.com/blog/2015/07/ups-observations-on-cve-2015-3113-prior-zero-days-and-the-pirpi-payload/) A June 23 FireEye blog post titled "Operation Clandestine Wolf" discussed a cyber espionage group, known as APT3, that had been exploiting a zero-day... Jul 27, 2015 By [Robert Falcone](https://www.paloaltonetworks.com/blog/author/robert-falcone/?ts=markdown "Posts by Robert Falcone") and [Richard Wartell](https://www.paloaltonetworks.com/blog/author/richard-wartell/?ts=markdown "Posts by Richard Wartell") [](https://origin-researchcenter.paloaltonetworks.com/blog/2015/07/all-recent-unit-42-threat-intelligence-right-at-the-top-of-your-inbox/) [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown) ## [All Recent Unit 42 Threat Intelligence - Right at the Top of Your Inbox](https://origin-researchcenter.paloaltonetworks.com/blog/2015/07/all-recent-unit-42-threat-intelligence-right-at-the-top-of-your-inbox/) Unit 42, the Palo Alto Networks threat intelligence team, shares regular research insights, including blog posts, whitepapers, videos and podcasts. Get notified every time new Unit... Jul 21, 2015 By [Palo Alto Networks](https://www.paloaltonetworks.com/blog/author/palo-alto-networks-staff/?ts=markdown "Posts by Palo Alto Networks") [](https://origin-researchcenter.paloaltonetworks.com/blog/2015/07/watering-hole-attack-on-aerospace-firm-exploits-cve-2015-5122-to-install-isspace-backdoor/) [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Malware](https://www.paloaltonetworks.com/blog/category/malware-2/?ts=markdown), [Security Platform](https://www.paloaltonetworks.com/blog/category/security-platform/?ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown), [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Watering Hole Attack on Aerospace Firm Exploits CVE-2015-5122 to Install Is...](https://origin-researchcenter.paloaltonetworks.com/blog/2015/07/watering-hole-attack-on-aerospace-firm-exploits-cve-2015-5122-to-install-isspace-backdoor/) On July 16, 2015, the Palo Alto Networks Unit 42 threat intelligence team discovered a watering hole attack on the website of a well-known aerospace f... Jul 20, 2015 By [Bryan Lee](https://www.paloaltonetworks.com/blog/author/bryan-lee/?ts=markdown "Posts by Bryan Lee") and [Josh Grunzweig](https://www.paloaltonetworks.com/blog/author/josh-grunzweig/?ts=markdown "Posts by Josh Grunzweig") [](https://origin-researchcenter.paloaltonetworks.com/blog/2015/07/palo-alto-networks-news-of-the-week-july-11/) [Events](https://www.paloaltonetworks.com/blog/category/events/?ts=markdown), [News of the Week](https://www.paloaltonetworks.com/blog/category/news-of-the-week/?ts=markdown) ## [Palo Alto Networks News of the Week -- July 11](https://origin-researchcenter.paloaltonetworks.com/blog/2015/07/palo-alto-networks-news-of-the-week-july-11/) Here is all of the top Palo Alto Networks news from this past week. Jul 11, 2015 By [Chad Berndtson](https://www.paloaltonetworks.com/blog/author/cberndston/?ts=markdown "Posts by Chad Berndtson") [](https://origin-researchcenter.paloaltonetworks.com/blog/2015/07/apt-group-ups-targets-us-government-with-hacking-team-flash-exploit/) [Malware](https://www.paloaltonetworks.com/blog/category/malware-2/?ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown), [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [APT Group UPS Targets US Government with Hacking Team Flash Exploit](https://origin-researchcenter.paloaltonetworks.com/blog/2015/07/apt-group-ups-targets-us-government-with-hacking-team-flash-exploit/) On July 8, 2015, Unit 42 used the AutoFocus Threat Intelligence service to locate and investigate activity consistent with a spear-phishing attack tar... Jul 10, 2015 By [Bryan Lee](https://www.paloaltonetworks.com/blog/author/bryan-lee/?ts=markdown "Posts by Bryan Lee") and [Robert Falcone](https://www.paloaltonetworks.com/blog/author/robert-falcone/?ts=markdown "Posts by Robert Falcone") [](https://origin-researchcenter.paloaltonetworks.com/blog/2015/07/palo-alto-networks-traps-protects-from-latest-flash-zero-day-vulnerability-cve-2015-5119/) [Endpoint](https://www.paloaltonetworks.com/blog/category/endpoint-2/?ts=markdown), [Security Platform](https://www.paloaltonetworks.com/blog/category/security-platform/?ts=markdown) ## [UPDATED: Palo Alto Networks Traps Protects From Latest Flash Zero-Day Vulne...](https://origin-researchcenter.paloaltonetworks.com/blog/2015/07/palo-alto-networks-traps-protects-from-latest-flash-zero-day-vulnerability-cve-2015-5119/) Following last week's headline-grabbing Hacking Team breach, we all learned of exploits utilizing various zero-day vulnerabilities in Adobe Flash. Successful exploitation of any of... Jul 09, 2015 By [Palo Alto Networks](https://www.paloaltonetworks.com/blog/author/palo-alto-networks-staff/?ts=markdown "Posts by Palo Alto Networks") [](https://origin-researchcenter.paloaltonetworks.com/blog/2015/05/the-latest-flash-uaf-vulnerabilities-in-exploit-kits/) [Malware](https://www.paloaltonetworks.com/blog/category/malware-2/?ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown), [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [The Latest Flash UAF Vulnerabilities in Exploit Kits](https://origin-researchcenter.paloaltonetworks.com/blog/2015/05/the-latest-flash-uaf-vulnerabilities-in-exploit-kits/) Recently, several popular exploit kits, including Angler, Flash EK, SweetOrange, Fiesta andNeutrino\[1\], have included several use-after-free (UAF) vulnerabilities in Adobe Flash to exploit victims' browsers. Pr... May 28, 2015 By [Tao Yan](https://www.paloaltonetworks.com/blog/author/tao-yan/?ts=markdown "Posts by Tao Yan") Load more blogs ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language