Unit 42 Incident Response Report analyzed thousands of incidents, revealing the top 5 large-scale intrusions, what tools and vulnerabilities they focus on.
Examine two Unit 42 incident response cases that provide valuable insights into how today’s threat landscape evolves and the strategies needed against it.
Cybersecurity platformization can pay off for your organization in numerous ways, getting a 174% return on investment and realizing a NPV of $26.2 mil...
CNAPP: Prisma Cloud leads the pack in GigaOm's inaugural CNAPP Radar report, excelling in key features like CIEM, risk prioritization and resource behavior monitoring.
Shift left with code to cloud strategies integrating protection at every stage, mitigate risks, enhance developer workflows, and secure production environments.
Enhance your cloud security with AI-driven analysis, insights and automation. Simplify threat detection, vulnerability management, and compliance for ...
Reduce your attack surface and improve your cloud and AI service security practices with a collaborative tutorial from Palo Alto Networks and Amazon SageMaker’s team.
AppDNA enhances risk classification in cloud-native environments and offers application-level insights to streamline risk prioritization and remediation.
Learn how Cortex XDR’s Identity Threat Detection and Response (ITDR) leverages honey users to enhance identity security by detecting and deceiving attackers.
Discover the power of a prevention-first approach in cloud detection and response. Learn how agent-based solutions provide real-time visibility and control.
We examine an LLM jailbreaking technique called "Deceptive Delight," a technique that mixes harmful topics with benign ones to trick AIs, with a high success ra...
Discover recent attacks using Lynx ransomware, a rebrand of INC, targeting multiple crucial sectors in the U.S. and UK with prevalent double-extortion tactics....
Four DNS tunneling campaigns identified through a new machine learning tool expose intricate tactics when targeting vital sectors like finance, healthcare and m...
We analyze new tools DPRK-linked APT Sparkling Pisces (aka Kimsuky) used in cyberespionage campaigns: KLogExe (a keylogger) and FPSpy (a backdoor variant)....
Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.
Get the latest news, invites to events, and threat alerts