Learn why threat actors succeed by exploiting security weaknesses. Defend against threats with integrated platforms, improved visibility and strong IAM.
Leveraging Rubrik in Cortex XSOARRubrik and Cortex XSOAR are excited to share that the new Rubrik Polaris content pack and integration is now available w...
Shining a Light on Log4j Exploit PayloadsCortex XDR Managed Threat Hunting deep-dive into rarely seen payloads attackers have attempted to execute using the Log4...
Learn why threat actors succeed by exploiting security weaknesses. Defend against threats with integrated platforms, improved visibility and strong IAM.
There is a ransomware speed crisis. Attacks have accelerated 100x faster since 2021. Discover why traditional security fails and build AI-powered defenses.
The cybersecurity landscape is being reshaped by AI, requiring a fundamental rethinking of our approach to cyber resilience and a new security framework.
Security blind spots are a key risk. Learn how a unified multicloud security fabric provides complete, real-time asset mapping to secure your entire estate.
Learn why traditional security fails against unique AI threats like prompt injection, and how continuous AI red teaming is vital for secure deployment.
How organizations can master multicloud security by moving from chaos to command with a unified framework to discover, deploy, protect, and operationalize.
Is your AI chatbot secure? With every prompt, new attack vectors emerge. Learn how runtime security protects your AI from evolving threats in real time.
Secure organizations' web edge with Prisma Browser for Essential Eight and ISM compliance. Palo Alto Networks fortifies applications against cyber threats.
Identity has become the new battleground. In a world where work happens everywhere and applications live in the cloud, passwords, passwordless authentication, and even MFA can no l...
Modern AppSec demands context. Cortex Cloud and Semgrep integrate to unify code, runtime, and infrastructure visibility, helping teams prioritize expl...
Application security posture management (ASPM) turns scans into context, prioritizes risk, and embeds guidance in developer workflows to prevent produ...
Understand the real AI security risks of running self-managed models, from hidden deployments to supply chain threats, and how to effectively monitor ...
Deploy Cortex XSIAM in 3 months or less with AI-powered migration tools. Replace your SIEM faster with automated onboarding and ready-to-use analytics.
Executive Summary AzureHound is a data collection tool intended for penetration testing that is part of the BloodHound suite. Threat actors misuse this tool to ...
Global smishing activity tracked by Unit 42 includes impersonation of many critical services. Its unique ecosystem allows attackers to quickly scale....
Threat actors behind the gift card fraud campaign Jingle Thief target retail via phishing and smishing, maintaining long-term access in cloud environments....
A nation-state actor stole BIG-IP source code and information on undisclosed vulnerabilities from F5. We explain what sets this theft apart from others....
Scattered Lapsus$ Hunters: Organizations, be aware of the effort of this cybercriminal alliance as they target retail and hospitality for extortion....
Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.
Get the latest news, invites to events, and threat alerts
Get the latest news, invites to events, and threat alerts