Corporate Blogs

Axios and Unit 42’s Sam Rubin Discuss Disruptive Cyberattacks

Axios and Unit 42’s Sam Rubin Discuss Disruptive Cyberattacks

Sam Rubin, SVP of Consulting and Threat Intelligence at Unit 42, spoke with Sam Sabin, cybersecurity reporter at Axios, about destructive cyberattacks...
Dec 10, 2024
Automation in Action — How 3 Customers Revolutionized SecOps with XSOAR

Automation in Action — How 3 Customers Revolutionized SecOps with XSOAR

See how three of Palo Alto Networks customers across various industries and regions are leveraging Cortex XSOAR.
Nov 20, 2024
Empower Developers to Secure AI Applications Through Code

Empower Developers to Secure AI Applications Through Code

Developers can now secure their AI applications with a few lines of code. Read the AI Runtime Security API intercept announcement.
Nov 19, 2024
The Intersection of Marketing and Technology

The Intersection of Marketing and Technology

The modern marketer must embrace technology to increase speed to market, improve competitiveness and deliver personalized and exceptional user experiences.
Nov 14, 2024
2025 Predictions — How One Year Will Redefine the Cybersecurity Industry

2025 Predictions — How One Year Will Redefine the Cybersecurity Industry

These predictions underscore the new pillars of cybersecurity – platform unity, data transparency and strategic partnerships – defining...
Nov 14, 2024
By 
A Security-First Approach to 6G

A Security-First Approach to 6G

5G and 6G can transform industries and drive the Industrial Revolution beyond connectivity. They need to provide Zero Trust, enterprise-grade security.
Nov 13, 2024
Exceptional User Experience — Every Application, Every Transaction

Exceptional User Experience — Every Application, Every Transaction

Palo Alto Networks ADEM empowers IT teams and optimizes productivity with visibility into users, branch sites, apps and IT infrastructure.
Nov 12, 2024
Strata Cloud Manager: One Interface, Complete Network Security Control

Network Security Blogs

From Risk to Resilience: OT Security Lessons from Industry Experts

From Risk to Resilience: OT Security Lessons from Industry Experts

Get actionable guidance to help you tackle today’s most pressing IT and OT security challenges in this Threat Vector podcast recap.
Dec 10, 2024
Learn How to Secure Your AWS Workloads at AWS re:Invent 2024

Learn How to Secure Your AWS Workloads at AWS re:Invent 2024

Join Palo Alto Networks in booth #1124 at AWS re:Invent 2024 to learn how to secure your AWS workloads & protect your cloud environments.
Nov 26, 2024
Empower Developers to Secure AI Applications Through Code

Empower Developers to Secure AI Applications Through Code

Developers can now secure their AI applications with a few lines of code. Read the AI Runtime Security API intercept announcement.
Nov 19, 2024
Exceptional User Experience — Every Application, Every Transaction

Exceptional User Experience — Every Application, Every Transaction

Palo Alto Networks ADEM empowers IT teams and optimizes productivity with visibility into users, branch sites, apps and IT infrastructure.
Nov 12, 2024
Strata Cloud Manager: One Interface, Complete Network Security Control

Strata Cloud Manager: One Interface, Complete Network Security Control

Strata Cloud Manager offers AIOps, Digital Experience Management (DEM), and management capabilities in a single, cohesiv...
Nov 07, 2024
Safeguard OT Environments with the Power of Precision AI

Safeguard OT Environments with the Power of Precision AI

New capabilities safeguard OT remote operations, mitigate risks for hard-to-patch assets, and extend protection into industrial environments.
Oct 21, 2024
The Future of Shopping: How Smart Stores are Transforming Retail

The Future of Shopping: How Smart Stores are Transforming Retail

Discover how IoT and smart stores are transforming retail with enhanced experiences and efficiency, while ensuring security with Palo Alto Networks.
Oct 17, 2024
Strata Copilot is Here

Strata Copilot is Here

Announcing the availability of Strata Copilot, the ultimate AI assistant for Network Security.
Oct 15, 2024

SASE Blogs

Secure BYOD with Prisma Access Browser for Mobile Devices

Secure BYOD with Prisma Access Browser for Mobile Devices

Find out how the new Prisma Access Browser for mobile devices helps secure enterprise work done on personal smartphones & tablets.
Dec 04, 2024
A New Phishing Frontier: From Email to SaaS Collaboration Apps

A New Phishing Frontier: From Email to SaaS Collaboration Apps

Phishing threats have jumped from email into collaboration SaaS apps like Microsoft Teams, Slack and Zoom. Find out how to protect your...
Nov 27, 2024
Palo Alto Networks Announces New SD-WAN Innovations

Palo Alto Networks Announces New SD-WAN Innovations

Deliver exceptional user experience, integrated user & app security, and operational resiliency & simplicity for the Zero Trust Branch.
Nov 26, 2024
Ride the Next Wave of AI-Powered SASE at AWS re:Invent 2024

Ride the Next Wave of AI-Powered SASE at AWS re:Invent 2024

Register for AWS re:Invent & find out how AI-powered Prisma SASE can help raise the bar on securing & managing access to cloud applications.
Nov 22, 2024
Securing Campus Networks with Prisma Access and Nile

Securing Campus Networks with Prisma Access and Nile

Prisma Access & Nile integration addresses campus & cloud environment security challenges to enhance protection, visibility & efficienc...
Nov 21, 2024
Secure Browsing Demands More Than Extensions

Secure Browsing Demands More Than Extensions

Organizations need an enterprise browser and a security-focused browser extension to protect data and secure unmanaged devices. Read more.
Nov 14, 2024
Exceptional User Experience — Every Application, Every Transaction

Exceptional User Experience — Every Application, Every Transaction

Palo Alto Networks ADEM empowers IT teams and optimizes productivity with visibility into users, branch sites, apps and IT infrastructure.
Nov 12, 2024
Operational Resilience: Ensuring Business Continuity with Prisma SASE

Operational Resilience: Ensuring Business Continuity with Prisma SASE

Operational resilience in Prisma SASE helps companies run with the highest levels of relia...
Nov 11, 2024

Cloud Native Security Blogs

Forecasting the 2025 Cloudscape

Forecasting the 2025 Cloudscape

Discover 2025 cloud security trends, predictions on AI-driven threats, market consolidation, data security in CNAPPs, and more from Prisma Cloud leaders.
Dec 05, 2024
Complying with OWASP Top 10 for LLM Applications and NIST AI 600-1

Complying with OWASP Top 10 for LLM Applications and NIST AI 600-1

AI applications require rigorous AI security that complies with standards like OWASP Top 10 LLM application risks and NIST AI 600-1 to ensure safe dep...
Dec 04, 2024
Deploying Secure LLM and RAG Applications with Amazon Bedrock and Prisma Cloud

Deploying Secure LLM and RAG Applications with Amazon Bedrock and Prisma Cl...

Generative AI advancements enable powerful applications but introduce risks, requiring comprehensive security measures throughout the application life...
Dec 03, 2024
Discover, Protect and Respond with AWS and Prisma Cloud

Discover, Protect and Respond with AWS and Prisma Cloud

The complex landscape of cloud services, particularly in multi-cloud environments, poses significant security challenges for organizations. Unmanaged cloud resources, human error, misconfigurations and the incr...
Nov 22, 2024
Experience Next-Generation Cloud Security at AWS re:Invent 2024

Experience Next-Generation Cloud Security at AWS re:Invent 2024

Join Prisma Cloud by Palo Alto Networks at AWS re:Invent 2024 in Las Vegas for AI security sessions, in-booth theaters, JAM sessions and demos at booth #1124.
Nov 19, 2024
Data Security, Meet Remediation: Introducing the New Integration Between Prisma Cloud DSPM and Cortex XSOAR

Data Security, Meet Remediation: Introducing the New Integration Between Pr...

Data Security: New Prisma Cloud DSPM & Cortex XSOAR integration automates remediation, enhancing security and governance in diverse cloud environments...
Nov 06, 2024
Shifting Security Left with Prisma Cloud and HashiCorp Packer

Shifting Security Left with Prisma Cloud and HashiCorp Packer

Use Prisma Cloud to secure Packer images by HashiCorp and protect your entire CI/CD pipeline with comprehensive compliance support.
Nov 01, 2024
GigaOm Recognizes Prisma Cloud as a CNAPP Leader

GigaOm Recognizes Prisma Cloud as a CNAPP Leader

CNAPP: Prisma Cloud leads the pack in GigaOm's inaugural CNAPP Radar report, excelling in key features like CIEM, risk prioritization and resource behavior monitoring.
Oct 29, 2024

Security Operations Blogs

MITRE ATT&CK 2024: Raising the Bar for Security Testing

MITRE ATT&CK 2024: Raising the Bar for Security Testing

MITRE's 2024 ATT&CK evaluations have evolved, testing vendors against Ransomware as a Service and DPRK threats, introducing false positive detection.
Dec 10, 2024
Stoked — Manifesting Innovation in Shared Threat Intelligence

Stoked — Manifesting Innovation in Shared Threat Intelligence

Explore how skateboarding's collaborative spirit mirrors sharing threat intelligence in cybersecurity, fostering innovation and collect...
Nov 25, 2024
Automation in Action — How 3 Customers Revolutionized SecOps with XSOAR

Automation in Action — How 3 Customers Revolutionized SecOps with XSOAR

See how three of Palo Alto Networks customers across various industries and regions are leveraging Cortex XSOAR.
Nov 20, 2024
Identify 60 Additional Server Protocols with Cortex Xpanse

Identify 60 Additional Server Protocols with Cortex Xpanse

Discover how Cortex Xpanse now identifies 60 additional server protocols in your attack surface, protecting against emerging threats across proxy, network, and database servers.
Nov 12, 2024
By 
Optimize Analyst Workflows with Cortex Copilot

Optimize Analyst Workflows with Cortex Copilot

Discover how Cortex Copilot streamlines security analyst workflows, reduces burnout, and accelerates incident investigations by leveraging AI to automate mundane tasks.
Nov 07, 2024
Shaking Up Security — The Power of AI-Native SOCs

Shaking Up Security — The Power of AI-Native SOCs

Discover how AI-native SOCs revolutionize cybersecurity, reducing alert fatigue and improving threat detection. Transform your security operations with AI.
Nov 06, 2024
Banking on AI to Defend the Financial Services Sector

Banking on AI to Defend the Financial Services Sector

Discover how financial institutions leverage AI to combat cyberthreats, enhance fraud detection, and streamline operations. Learn about FinTech security.
Oct 31, 2024
Cloud Security — Maturing Past the Awkward Teenage Years

Cloud Security — Maturing Past the Awkward Teenage Years

Explore cloud security's maturation, common misconceptions, and best practices for robust cloud defenses.
Oct 22, 2024

Unit 42 Threat Research

company article

Threat Brief: Operation Lunar Peek, Activity Related to CVE-2024-...

We detail the observed limited activity regarding authentication bypass vulnerability CVE-2024-0012 affecting specific versions of PAN-OS software, and include ...
November 22, 2024
By  Unit 42
company article

Network Abuses Leveraging High-Profile Events: Suspicious Domain ...

Unit 42 probes network abuses around events like the Olympics, featuring case studies of scams and phishing through domain registrations and more....
company article

Threat Assessment: Howling Scorpius (Akira Ransomware)

Howling Scorpius, active since 2023, uses Akira ransomware to target businesses globally, employing a double-extortion strategy and upgrading tools regularly....
December 2, 2024
company article

Lateral Movement on macOS: Unique and Popular Techniques and In-t...

We uncover macOS lateral movement tactics, such as SSH key misuse and AppleScript exploitation. Strategies to counter this attack trend are also discussed....
November 22, 2024
company article

Threat Assessment: Ignoble Scorpius, Distributors of BlackSuit Ra...

Explore this assessment on cybercrime group Ignoble Scorpius, distributors of BlackSuit ransomware. Since May 2023, operations have increased —affecting criti...
November 20, 2024
By  Unit 42
company article

FrostyGoop’s Zoom-In: A Closer Look into the Malware Artifacts, B...

We analyze FrostyGoop malware, which targets OT systems. This article walks through newly discovered samples, indicators, and also examines configurations and n...
November 19, 2024
company article

Fake North Korean IT Worker Linked to BeaverTail Video Conference...

North Korean IT worker cluster CL-STA-0237 instigated phishing attacks via video apps in Laos, exploiting U.S. IT firms and major tech identities....
November 14, 2024
By  Unit 42
company article

Global Companies Are Unknowingly Paying North Koreans: Here’s How...

We discuss North Korea's use of IT workers to infiltrate companies, detailing detection strategies like IT asset management and IP analysis to counter this....
November 13, 2024

Subscribe to the Newsletter!

Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.