A platformized approach to cybersecurity can help organizations navigate challenges while strengthening resilience, boosting efficiency and managing costs.
Palo Alto Networks is an integrated national security partner with the Federal Government and has 10 cyber recommendations for the incoming administration.
Exfiltration Shield extracts HTTP requests and verify domains in real time, preventing attackers from using trusted domains to exfiltrate data undetec...
5G and AI technology convergence accelerate business transformation in critical infrastructure and governments, enhancing connectivity and intelligence.
Palo Alto Networks saw a 1,800% increase in DeepSeek traffic, highlighting the need to stay vigilant against new AI tools outpacing security measures....
Palo Alto Networks made the CRN 2025 Security 100 list for its AI-powered cybersecurity, securing enterprises, streamlining operations and reducing costs.
5G and AI technology convergence accelerate business transformation in critical infrastructure and governments, enhancing connectivity and intelligence.
Secure your software supply chain with Prisma® Cloud, the top-ranked leader in GigaOm's Radar, offering end-to-end protection for cloud-native applications.
Discover 2025 cloud security trends, predictions on AI-driven threats, market consolidation, data security in CNAPPs, and more from Prisma Cloud leaders.
AI applications require rigorous AI security that complies with standards like OWASP Top 10 LLM application risks and NIST AI 600-1 to ensure safe dep...
Generative AI advancements enable powerful applications but introduce risks, requiring comprehensive security measures throughout the application life...
The complex landscape of cloud services, particularly in multi-cloud environments, poses significant security challenges for organizations. Unmanaged cloud resources, human error, misconfigurations and the incr...
This playbook automates the identification and remediation of persistent threats that leverage scheduled tasks to execute malicious payloads across endpoints.
Discover how Cortex Copilot democratizes threat hunting by enabling analysts to investigate security incidents with AI-powered guidance. Learn how a new threat hunter uncovered a p...
We detail the observed limited activity regarding authentication bypass vulnerability CVE-2024-0012 affecting specific versions of PAN-OS software, and include ...
We identified multiple vulnerabilities in ICONICS Suite, SCADA software used in numerous OT applications. This article offers a technical analysis of our findin...
A graph intelligence-based pipeline and WHOIS data are among the tools we used to identify this campaign, which introduced a variant of domain generation algori...
A topological analysis and case studies add nuance to a study of malicious traffic distribution systems. We compare their use by attackers to benign systems....
Malware authors use AES encryption and code virtualization to evade sandbox static analysis. We explore how this facilitates spread of Agent Tesla, XWorm and mo...
We analyze the backdoor Squidoor, used by a suspected Chinese threat actor to steal sensitive information. This multi-platform backdoor is built for stealth....
Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.
Get the latest news, invites to events, and threat alerts