Corporate Blogs

DeepSeek Unveiled — Exposing the GenAI Risks Hiding in Plain Sight

DeepSeek Unveiled — Exposing the GenAI Risks Hiding in Plain Sight

Palo Alto Networks saw a 1,800% increase in DeepSeek traffic, highlighting the need to stay vigilant against new AI tools outpacing security measures....
Feb 28, 2025
Driving Innovation Together — Palo Alto Networks 2024 Partner Awards

Driving Innovation Together — Palo Alto Networks 2024 Partner Awards

The 2024 Palo Alto Networks Partner Awards winners embody the spirit of collaboration and customer-centricity.
Feb 06, 2025
10 Cyber Recommendations for the Trump Administration

10 Cyber Recommendations for the Trump Administration

Palo Alto Networks is an integrated national security partner with the Federal Government and has 10 cyber recommendations for the incoming administration.
Feb 03, 2025
DeepSeek’s Rise Shows AI Security Remains a Moving Target

DeepSeek’s Rise Shows AI Security Remains a Moving Target

DeepSeek is an LLM threatening to disrupt current AI market leaders and fundamentally change the economics of AI-powered applications.
Jan 30, 2025
Cortex Is the First SOC Platform to Achieve FedRAMP High Authorization

Cortex Is the First SOC Platform to Achieve FedRAMP High Authorization

Cortex achieves FedRAMP High Authorization, becoming the first AI-driven SOC platform to meet the highest government security standards...
Jan 30, 2025
IoMT Security Is Critical as Patients Take Control of Own Healthcare

IoMT Security Is Critical as Patients Take Control of Own Healthcare

IoMT devices were not created with cybersecurity at the forefront, a robust security strategy can alleviate attack concerns for organizations and patients.
Jan 29, 2025
C-Suite Leaders Embrace Platformization for Security Success

C-Suite Leaders Embrace Platformization for Security Success

"Capturing the cybersecurity dividend: How security platforms generate business value" provides insights and steps to a platform approach to security.
Jan 28, 2025
AI-Driven Security by Palo Alto Networks and IBM

AI-Driven Security by Palo Alto Networks and IBM

This compelling video series from IBM and Palo Alto Networks dives into how cutting-edge security operations can help businesses thrive in the age of AI.
Jan 23, 2025
By 

Network Security Blogs

DeepSeek Unveiled — Exposing the GenAI Risks Hiding in Plain Sight

DeepSeek Unveiled — Exposing the GenAI Risks Hiding in Plain Sight

Palo Alto Networks saw a 1,800% increase in DeepSeek traffic, highlighting the need to stay vigilant against new AI tools outpacing security measures....
Feb 28, 2025
Palo Alto Networks Recognized as a Leader in Omdia Market Radar

Palo Alto Networks Recognized as a Leader in Omdia Market Radar

Omdia report includes an evaluation of the OT security market, recommendations for choosing solutions, and analysis of OT cybersecurity platforms.
Feb 24, 2025
CRN 2025 Security 100 List names Palo Alto Networks

CRN 2025 Security 100 List names Palo Alto Networks

Palo Alto Networks made the CRN 2025 Security 100 list for its AI-powered cybersecurity, securing enterprises, streamlining operations and reducing costs.
Feb 18, 2025
DeepSeek’s Rise Shows AI Security Remains a Moving Target

DeepSeek’s Rise Shows AI Security Remains a Moving Target

DeepSeek is an LLM threatening to disrupt current AI market leaders and fundamentally change the economics of AI-powered applications.
Jan 30, 2025
C-Suite Leaders Embrace Platformization for Security Success

C-Suite Leaders Embrace Platformization for Security Success

"Capturing the cybersecurity dividend: How security platforms generate business value" provides insights and steps to a platform approach to security.
Jan 28, 2025
Secure AI Agents by Design with AI Runtime Security

Secure AI Agents by Design with AI Runtime Security

AI agents are growing at a rapid pace. Find out how AI Runtime Security can help secure enterprise AI applications that include AI agents.
Jan 23, 2025
Securing DOT Infrastructure

Securing DOT Infrastructure

The nature of ITS networks, IT-OT convergence, limited physical security controls, and interconnected IoT devices vulnerabilities pose challenges.
Jan 17, 2025
UScellular and Palo Alto Networks Join Forces to Secure 5G

UScellular and Palo Alto Networks Join Forces to Secure 5G

UScellular and Palo Alto Networks are teaming up once again to tackle the ever-growing security challenges of LTE, 5G and Gi-LAN networks.
Dec 16, 2024

SASE Blogs

Seamless Service Provider Network Attach with Prisma SASE

Seamless Service Provider Network Attach with Prisma SASE

Prisma SASE now enables seamless network attach and deep network integration with service provider partner core and transport networks.
Feb 27, 2025
DeepSeek Unveiled — Exposing the GenAI Risks Hiding in Plain Sight

DeepSeek Unveiled — Exposing the GenAI Risks Hiding in Plain Sight

Palo Alto Networks saw a 1,800% increase in DeepSeek traffic, highlighting the need to sta...
Feb 28, 2025
Omdia Report Reinforces Need to Browse Bravely

Omdia Report Reinforces Need to Browse Bravely

New report sheds light on the shifting workforce cybersecurity dynamics, explores persistent challenges & presents actionable solutions.
Feb 14, 2025
The New Cybersecurity Duo: Prisma Access Browser and Its Extension

The New Cybersecurity Duo: Prisma Access Browser and Its Extension

Get a closer look at how Prisma Access Browser & the Prisma Access Browser Extension provide comprehensive, enterprise-wide security.
Feb 11, 2025
Prisma SD-WAN FedRAMP Authorization for a Zero Trust Government Branch

Prisma SD-WAN FedRAMP Authorization for a Zero Trust Government Branch

Prisma SD-WAN has achieved FedRAMP High Authorization, making it available for U.S. governmental agencies to connect & secure their bra...
Feb 10, 2025
Browse Bravely and Secure the Future of Work

Browse Bravely and Secure the Future of Work

Organizations can browse bravely with Prisma Access Browser, the most secure browser.
Feb 07, 2025
Protecting Web-Based Work

Protecting Web-Based Work

Web browsers have evolved for work, but security hasn't kept up. This poses cyber risks. Protecting browsers is crucial for safe web-ba...
Jan 08, 2025
Ensure Your Company’s Business Continuity with Prisma Access Browser

Ensure Your Company’s Business Continuity with Prisma Access Browser

Use enhanced access, data & identity control security features for secure, uninterrupted b...
Dec 20, 2024

Cloud Security Blogs

Introducing Cortex Cloud — The Future of Real-Time Cloud Security

Introducing Cortex Cloud — The Future of Real-Time Cloud Security

Cortex Cloud brings the world’s leading CNAPP onto the #1 SecOps platform, delivering real-time protection — for the fir...
Feb 13, 2025
Prisma Cloud: The Industry’s Only FedRAMP High Authorized CNAPP

Prisma Cloud: The Industry’s Only FedRAMP High Authorized CNAPP

FedRAMP bestows the first CNAPP with FedRAMP High authorization, making Prisma Cloud the only CNAPP to hold FedRAMP High certification.
Dec 19, 2024
GigaOm Names Prisma Cloud a Leader in Software Supply Chain Security

GigaOm Names Prisma Cloud a Leader in Software Supply Chain Security

Secure your software supply chain with Prisma® Cloud, the top-ranked leader in GigaOm's Radar, offering end-to-end protection for cloud-native applications.
Dec 17, 2024
Forecasting the 2025 Cloudscape

Forecasting the 2025 Cloudscape

Discover 2025 cloud security trends, predictions on AI-driven threats, market consolidation, data security in CNAPPs, and more from Prisma Cloud leaders.
Dec 05, 2024
Complying with OWASP Top 10 for LLM Applications and NIST AI 600-1

Complying with OWASP Top 10 for LLM Applications and NIST AI 600-1

AI applications require rigorous AI security that complies with standards like OWASP Top 10 LLM application risks and NIST AI 600-1 to ensure safe dep...
Dec 04, 2024
Deploying Secure LLM and RAG Applications with Amazon Bedrock and Prisma Cloud

Deploying Secure LLM and RAG Applications with Amazon Bedrock and Prisma Cl...

Generative AI advancements enable powerful applications but introduce risks, requiring comprehensive security measures throughout the application life...
Dec 03, 2024
Discover, Protect and Respond with AWS and Prisma Cloud

Discover, Protect and Respond with AWS and Prisma Cloud

The complex landscape of cloud services, particularly in multi-cloud environments, poses significant security challenges for organizations. Unmanaged cloud resources, human error, misconfigurations and the incr...
Nov 22, 2024
Experience Next-Generation Cloud Security at AWS re:Invent 2024

Experience Next-Generation Cloud Security at AWS re:Invent 2024

Join Prisma Cloud by Palo Alto Networks at AWS re:Invent 2024 in Las Vegas for AI security sessions, in-booth theaters, JAM sessions and demos at booth #1124.
Nov 19, 2024

Security Operations Blogs

Automating Response to Credential Dumping Attacks

Automated playbook designed to detect, contain and remediate credential dumping activity.
Feb 27, 2025
Cortex Xpanse Protects Against Malicious Domain Takeover Techniques

Cortex Xpanse Protects Against Malicious Domain Takeover Techniques

Malicious domain takeovers have become an increasing concern for businesses as attackers exploit vulnerabilities by gaining unauthorize...
Feb 26, 2025
By 
Automating Response to Unauthorized User Account Creation

Automating Response to Unauthorized User Account Creation

This playbook automates incident response actions to identify, investigate, and remediate unauthorized hidden user account creation.
Feb 20, 2025
MITRE ATT&CK Evaluations — Cortex XDR Among Elite in Endpoint Security

MITRE ATT&CK Evaluations — Cortex XDR Among Elite in Endpoint Security

Palo Alto Networks achieves top MITRE ATT&CK 2024 results with 100% detection rates agains...
Feb 19, 2025
Democratize Threat Hunting with Cortex Copilot

Democratize Threat Hunting with Cortex Copilot

Discover how Cortex Copilot democratizes threat hunting by enabling analysts to investigate security incidents with AI-powered guidance. Learn how a new threat hunter uncovered a p...
Feb 19, 2025
By 

SSO Password Spray Playbook

Learn how to detect and prevent SSO password spray attacks with our comprehensive security playbook. Automate response and strengthen authentication security.
Feb 13, 2025
Introducing Cortex Cloud — The Future of Real-Time Cloud Security
Demystifying Impossible Traveler Detection

Demystifying Impossible Traveler Detection

Discover how Impossible Traveler Detection in Cortex XDR identifies suspicious logins from distant locations in a short time, and how to address challenges like VPN impacts and red...
Feb 12, 2025

Unit 42 Threat Research

company article

Threat Brief: Operation Lunar Peek, Activity Related to CVE-2024-...

We detail the observed limited activity regarding authentication bypass vulnerability CVE-2024-0012 affecting specific versions of PAN-OS software, and include ...
November 22, 2024
By  Unit 42
company article

JavaGhost’s Persistent Phishing Attacks From the Cloud

Unit 42 reports on phishing activity linked to the threat group JavaGhost. These attacks target organizations’ AWS environments....
February 28, 2025
company article

Squidoor: Suspected Chinese Threat Actor’s Backdoor Targets Globa...

We analyze the backdoor Squidoor, used by a suspected Chinese threat actor to steal sensitive information. This multi-platform backdoor is built for stealth....
February 27, 2025
company article

RustDoor and Koi Stealer for macOS Used by North Korea-Linked Thr...

Koi Stealer and RustDoor malware were used in a campaign linked to North Korea. This activity targeted crypto wallet owners....
February 26, 2025
company article

Auto-Color: An Emerging and Evasive Linux Backdoor

The new Linux malware named Auto-color uses advanced evasion tactics. Discovered by Unit 42, this article cover its installation, evasion features and more....
February 24, 2025
company article

Investigating LLM Jailbreaking of Popular Generative AI Web Produ...

We discuss vulnerabilities in popular GenAI web products to LLM jailbreaks. Single-turn strategies remain effective, but multi-turn approaches show greater succ...
February 21, 2025
By  Yongzhe Huang ,   Yang Ji ,   Wenjun Hu
company article

Stately Taurus Activity in Southeast Asia Links to Bookworm Malwa...

Unit 42 details the just-discovered connection between threat group Stately Taurus (aka Mustang Panda) and the malware Bookworm, found during analysis of the gr...
February 20, 2025
company article

Multiple Vulnerabilities Discovered in NVIDIA CUDA Toolkit

Unit 42 researchers detail nine vulnerabilities discovered in NVIDIA’s CUDA-based toolkit. The affected utilities help analyze cubin (binary) files....
February 19, 2025
By  Kai Lu

Subscribe to the Newsletter!

Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.