Federal systems shift to the cloud, we aid in developing security solutions as robust as on-prem tools. We developed the only FedRAMP High authorized CNAPP.
Federal systems shift to the cloud, we aid in developing security solutions as robust as on-prem tools. We developed the only FedRAMP High authorized CNAPP.
5G and AI technology convergence accelerate business transformation in critical infrastructure and governments, enhancing connectivity and intelligence.
A platformized approach to cybersecurity can help organizations navigate challenges while strengthening resilience, boosting efficiency and managing costs.
Exfiltration Shield extracts HTTP requests and verify domains in real time, preventing attackers from using trusted domains to exfiltrate data undetec...
5G and AI technology convergence accelerate business transformation in critical infrastructure and governments, enhancing connectivity and intelligence.
Palo Alto Networks saw a 1,800% increase in DeepSeek traffic, highlighting the need to stay vigilant against new AI tools outpacing security measures....
Palo Alto Networks made the CRN 2025 Security 100 list for its AI-powered cybersecurity, securing enterprises, streamlining operations and reducing costs.
5G and AI technology convergence accelerate business transformation in critical infrastructure and governments, enhancing connectivity and intelligence.
Modern cloud threats require real-time protection to stop attacks in progress, correlate threats across the application stack and enable rapid, automa...
Prisma Cloud becomes Cortex Cloud: Our CNAPP story of innovation, defining and transforming cloud security for the duration of CNAPP’s five-year marke...
Secure your software supply chain with Prisma® Cloud, the top-ranked leader in GigaOm's Radar, offering end-to-end protection for cloud-native applications.
Discover 2025 cloud security trends, predictions on AI-driven threats, market consolidation, data security in CNAPPs, and more from Prisma Cloud leaders.
AI applications require rigorous AI security that complies with standards like OWASP Top 10 LLM application risks and NIST AI 600-1 to ensure safe dep...
This playbook automates the identification and remediation of persistent threats that leverage scheduled tasks to execute malicious payloads across endpoints.
We detail the observed limited activity regarding authentication bypass vulnerability CVE-2024-0012 affecting specific versions of PAN-OS software, and include ...
A compromise of the GitHub action tj-actions/changed-files highlights how attackers could exploit vulnerabilities in third-party actions to compromise supply ch...
Three unusual malware samples analyzed here include an ISS backdoor developed in a rare language, a bootkit and a Windows implant of a post-exploit framework....
We identified a campaign spreading thousands of sca crypto investment platforms through websites and mobile apps, possibly through a standardized toolkit....
We identified multiple vulnerabilities in ICONICS Suite, SCADA software used in numerous OT applications. This article offers a technical analysis of our findin...
A graph intelligence-based pipeline and WHOIS data are among the tools we used to identify this campaign, which introduced a variant of domain generation algori...
A topological analysis and case studies add nuance to a study of malicious traffic distribution systems. We compare their use by attackers to benign systems....
Malware authors use AES encryption and code virtualization to evade sandbox static analysis. We explore how this facilitates spread of Agent Tesla, XWorm and mo...
Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.
Get the latest news, invites to events, and threat alerts