Corporate Blogs

Palo Alto Networks Leads the Way with Quantum and Multicloud Security
Muddled Libra: From Social Engineering to Enterprise-Scale Disruption

Muddled Libra: From Social Engineering to Enterprise-Scale Disruption

Unit 42's latest research reveals how Muddled Libra (AKA Scattered Spider) has transformed into teams that pose risks to organizations ...
Jul 26, 2025
Security by Design — UX and AI in Modern Cybersecurity

Security by Design — UX and AI in Modern Cybersecurity

Nelson Lee reveals how thoughtful design and emerging AI technologies are reshaping cybersecurity operations from the ground up.
Jul 24, 2025
Redefining DNS Protection

Redefining DNS Protection

ADNS leverages Precision AI®, our proprietary AI system combining deep learning, machine learning and generative AI to deliver DNS-layer protection.
Jul 23, 2025
By 
How Apps and Your Phone Can Expose Your Life Without Permission

How Apps and Your Phone Can Expose Your Life Without Permission

Security challenges encompass the entire ecosystem of apps, services and IoT devices that modern consumers use without understanding th...
Jul 22, 2025
A Leader in the 2025 Gartner Magic Quadrant for EPP — 3 Years Running
Unit 42 MDR Recognized as a Leader in MDR, Again

Unit 42 MDR Recognized as a Leader in MDR, Again

Palo Alto Networks Unit 42 MDR Recognized as a Leader in the Frost Radar™: Global Managed Detection and Response (MDR), 2025.
Jul 16, 2025
The Only Vendor Named a SASE Leader for the Third Time

The Only Vendor Named a SASE Leader for the Third Time

Palo Alto Networks is the only vendor to be named a Leader for the third time in the 2025 Gartner® Magic Quadrant™ for SASE platforms.
Jul 15, 2025

Network Security Blogs

Palo Alto Networks Leads the Way with Quantum and Multicloud Security
Eliminate Blind Spots in Encrypted Traffic to Outsmart Hidden Threats

Eliminate Blind Spots in Encrypted Traffic to Outsmart Hidden Threats

Palo Alto Networks announces new Encrypted Sliver Command and Control (C2) Detection available in Advanced Threat Protection.
Aug 12, 2025
Secure App Traffic with Nutanix Flow & Palo Alto Networks VM-Series

Secure App Traffic with Nutanix Flow & Palo Alto Networks VM-Series

Palo Alto Networks VM-Series and Nutanix Flow secure datacenter application flows to reduce risk & meet compliance goals.
Aug 07, 2025
A Leader in IDC MarketScape for Enterprise Hybrid Firewall Solutions

A Leader in IDC MarketScape for Enterprise Hybrid Firewall Solutions

Palo Alto Networks recognized for offering a unified, AI-powered Zero Trust platform for modern network security.
Aug 06, 2025
How Georgia Department of Transportation Is Building Cyber Resilience

How Georgia Department of Transportation Is Building Cyber Resilience

GDOT boosts network security and resilience with Palo Alto Networks Next-Gen Firewalls. This investment is for public safety and GA transport's future...
Aug 05, 2025
Prisma AIRS on NVIDIA BlueField Secures the Industrial Edge

Prisma AIRS on NVIDIA BlueField Secures the Industrial Edge

Palo Alto Networks is teaming with NVIDIA & Siemens to accelerate zero-trust protection directly to every edge node & minimize risk.
Redefining DNS Protection

Redefining DNS Protection

ADNS leverages Precision AI®, our proprietary AI system combining deep learning, machine learning and generative AI to deliver DNS-layer protection.
Jul 23, 2025
By 
Setting the Standard for Zero Trust Platforms

Setting the Standard for Zero Trust Platforms

Palo Alto Networks is a Leader in The Forrester Wave™: Zero Trust Platforms, Q3 2025 with the highest score in the Current Offering category.
Jul 11, 2025

SASE Blogs

Why Your AI Agent Needs a Performance Review

Why Your AI Agent Needs a Performance Review

CxOs need to unlock the true potential of AI without the fear of a friendly AI agent accidentally bringing down the house.
Aug 13, 2025
Prisma Access Browser Achieves FedRAMP Moderate Authorization

Prisma Access Browser Achieves FedRAMP Moderate Authorization

Prisma Access Browser provides organizations in the U.S. federal government superior brows...
Jul 29, 2025
Reimagine Secure WAN for Harsh Environments with Prisma SD-WAN

Reimagine Secure WAN for Harsh Environments with Prisma SD-WAN

New Prisma SD-WAN ruggedized appliances deliver consistent, secure & high-performance connectivity in even the harshest conditions.
Jul 21, 2025
The Only Vendor Named a SASE Leader for the Third Time

The Only Vendor Named a SASE Leader for the Third Time

Palo Alto Networks is the only vendor to be named a Leader for the third time in the 2025 Gartner® Magic Quadrant™ for SASE platforms.
Jul 15, 2025
Setting the Standard for Zero Trust Platforms

Setting the Standard for Zero Trust Platforms

Palo Alto Networks is a Leader in The Forrester Wave™: Zero Trust Platforms, Q3 2025 with the highest score in the Current Offering cat...
Jul 11, 2025
Dedicated Data Plane Improves SASE Resilience

Dedicated Data Plane Improves SASE Resilience

Prisma SASE provides a secure, isolated and scalable way to navigate the complexities of digital transformation and the evolving nature of cyberthreats.
Jun 26, 2025
Chart Your SASE Transformation with Prisma SD-WAN

Chart Your SASE Transformation with Prisma SD-WAN

Successful SASE transformations often require balancing both network-led and security-led transformation priorities for a fully integra...
Jun 25, 2025
Examining the Coffee Shop Model and SASE

Examining the Coffee Shop Model and SASE

Although alluring, the coffee shop model doesn't meet enterprise networking & security standards. Consider the Zero Trust Branch model instead.
Jun 11, 2025

Cloud Security Blogs

Beyond Integration Theater: Why Counting Connections Misses the Point in Cloud Security

Beyond Integration Theater: Why Counting Connections Misses the Point in Cl...

Integrations: Go beyond the count. Our platform unifies data from all your sources with AI-driven analysis and automation to deliver measurable securi...
Aug 14, 2025
Use Microsoft Sensitivity Labels in Your Multicloud Security Strategy with Cortex Cloud DSPM

Use Microsoft Sensitivity Labels in Your Multicloud Security Strategy with ...

See Microsoft Purview Information Protection (MPIP) sensitivity labels for files across your cloud environment. Identify gaps and manage risk with Cor...
Aug 12, 2025
Don’t Let Inactive AI Models Linger: Reduce Risk and Cost with Cortex Cloud

Don’t Let Inactive AI Models Linger: Reduce Risk and Cost with Cortex Cloud

Reduce risks and costs from inactive AI models. Cortex Cloud's non-intrusive solution provides visibility and helps you clean up unused artifacts.
Aug 11, 2025
Introducing Cortex Cloud ASPM

Introducing Cortex Cloud ASPM

Cortex Cloud ASPM redefines application security with context-aware prevention, unified policy and runtime insight across the full software lifecycle.
Aug 05, 2025
Resilience by Design: Security in the Age of Offensive AI

Resilience by Design: Security in the Age of Offensive AI

Resilience by design is the new imperative in cybersecurity, enabling defenders to contain AI-powered attacks and blunt their impact in the first five minutes.
Aug 01, 2025
What’s New in Cortex Cloud

What’s New in Cortex Cloud

Cloud attack surface management, file integrity monitoring, and Microsoft 365 DSPM lead Cortex Cloud’s innovations to eliminate blind spots and secure data.
Jul 24, 2025
See What Attackers Can Reach in Your Cloud

See What Attackers Can Reach in Your Cloud

Cloud-based data breaches expose high-risk assets to the internet. Learn how to validate, prioritize and remediate external exposure with External Probe Validation.
Jul 21, 2025
AI's Hidden Security Debt

AI's Hidden Security Debt

AI-powered coding assistants introduce security risks by generating flawed code, amplifying vulnerabilities, and undermining developer judgment at scale.
Jul 16, 2025

Security Operations Blogs

Why Integrated File Integrity Monitoring Matters for Elevating Your Security

Why Integrated File Integrity Monitoring Matters for Elevating Your Securit...

Strengthen security & compliance with integrated File Integrity Monitoring (FIM). Learn how Cortex FIM provides real-time detection of unauthorized ch...
Aug 12, 2025
Cortex XDR Is the Only Endpoint Security Market Leader Certified in Both AVC EDR Detection and Anti-Tampering Tests

Cortex XDR Is the Only Endpoint Security Market Leader Certified in Both AV...

Cortex XDR is the only endpoint security market leader certified in both AV-Comparative EDR Detection and Anti-Tampering tests, proving superior threat detection.
Aug 06, 2025
SE Labs Awards Palo Alto Networks AAA Rating and 100% Prevention Against Ransomware

SE Labs Awards Palo Alto Networks AAA Rating and 100% Prevention Against Ra...

SE Labs awards Palo Alto Networks Cortex XDR a perfect 100% accuracy rating and AAA grade ...
Aug 05, 2025
Think You Have Visibility? Think Again.

Think You Have Visibility? Think Again.

Discover how Cortex XDR & XSIAM's Data Stitching and Smart Grouping unify security data, streamline SecOps, and accelerate threat investigations.
Jul 29, 2025
Security by Design — UX and AI in Modern Cybersecurity

Security by Design — UX and AI in Modern Cybersecurity

Nelson Lee reveals how thoughtful design and emerging AI technologies are reshaping cybersecurity operations from the ground up.
Jul 24, 2025
What’s New for Cortex (July ‘25)

What’s New for Cortex (July ‘25)

The latest release of Cortex harnesses AI to deliver more proactive security, expand visibility, and streamline workflows.
Jul 24, 2025
How Apps and Your Phone Can Expose Your Life Without Permission

How Apps and Your Phone Can Expose Your Life Without Permission

Security challenges encompass the entire ecosystem of apps, services and IoT devices that modern consumers use without understanding th...
Jul 22, 2025
Disrupting Legacy Vulnerability Management

Disrupting Legacy Vulnerability Management

Introducing the general availability of Cortex Exposure Management, a groundbreaking solution that will redefine traditional vulnerabil...
Jul 21, 2025

Unit 42 Threat Research

company article

Threat Brief: Operation Lunar Peek, Activity Related to CVE-2024-...

We detail the observed limited activity regarding authentication bypass vulnerability CVE-2024-0012 affecting specific versions of PAN-OS software, and include ...
November 22, 2024
By  Unit 42
company article

A Mega Malware Analysis Tutorial Featuring Donut-Generated Shellc...

A beginner-friendly tutorial on analyzing .NET malware teaches you how to use common tools, recognize techniques and understand infection chains. ...
August 14, 2025
company article

Muddled Libra’s Strike Teams: Amalgamated Evil

A look at the variance within Muddled Libra (aka Scattered Spider, Octo Tempest). Its lack of structure creates multiple teams with distinct skill sets....
August 12, 2025
company article

Keys to the Kingdom: Erlang/OTP SSH Vulnerability Analysis and Ex...

CVE-2025-32433 allows for remote code execution in sshd for certain versions of Erlang programming language’s OTP. We reproduced this CVE and share our findin...
company article

New Infection Chain and ConfuserEx-Based Obfuscation for DarkClou...

DarkCloud Stealer's delivery has shifted. We explore three different attack chains that use ConfuserEx obfuscation and a final payload in Visual Basic 6....
company article

Muddled Libra: Why Are We So Obsessed With You?

Muddled Libra gets media attention due to its consistent playbook and unique use of vishing. The group's English fluency is another major factor. ...
August 6, 2025
company article

When Good Accounts Go Bad: Exploiting Delegated Managed Service A...

BadSuccessor is an attack vector in Windows Server 2025. Under certain conditions it allows privilege elevation via dMSAs. We analyze its mechanics. ...
August 6, 2025
company article

Project AK47: Uncovering a Link to the SharePoint Vulnerability A...

Project AK47, a toolset including ransomware, was used to leverage SharePoint exploit chain ToolShell. This activity overlaps with Storm-2603....
August 5, 2025

Subscribe to the Newsletter!

Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.