“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, consulting, engineering and more. Our objective is to present different viewpoints and predictions on how artificial intelligence is impacting the current...
“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, consulting, engineering and more....
AI tends to be understood as one coherent field of study and application where similar solutions apply for all the use cases. The reality is that applying AI in real-world environm...
Cyberthreats are increasing in volume and complexity, making it difficult for network defenders to protect their organizations. Threat actors are evolving their tools and technique...
Each year, Unit 42 Incident Response and Threat Intelligence teams help hundreds of organizations assess, respond and recover from cyberattacks. Along the way, we collect data abou...
A new report by ABI Research and Palo Alto Networks on the state of operational technology (OT) security found that, within the past year, one in four industrial enterprises said they had to shut down their ope...
Investing in Palo Alto Networks Cloud-Delivered Security Services (CDSS) provided a 357% return on investment (ROI) and net present value (NPV) of $10.04 million over 3 years, alon...
Cyberthreats are increasing in volume and complexity, making it difficult for network defenders to protect their organizations. Threat actors are evolving their tools and technique...
The Marine Transportation System (MTS) is a pillar of U.S. trade and the broader economy. Its system of ports, terminals, vessels, waterways and land-side connections underpin $5.4...
Remember when securing your network meant throwing up a firewall and calling it a day? Well, the cellular network industry has evolved, and so have th...
In the ever-evolving landscape of Network Security, organizations grapple with complex challenges, seeking innovative solutions to strengthen their defenses. Enter Strata Cloud Man...
In today's digital landscape, organizations heavily rely on a suite of productivity applications, like Microsoft 365 and Google Suite for their day-to...
It’s not clear who first uttered the quip: Of course, I can keep a secret. It's the people I tell it to that can't. But what’s clear is that there are plenty of times when it’s a m...
A few weeks ago, over 101,000 top decision-makers, inventors, and innovators came together at the world’s largest connectivity event, Mobile World Con...
Palo Alto Networks is taking charge in cybersecurity; this time it's by being acknowledged as a leader in The Forrester Wave™: Security Service Edge Solutions, Q1 2024 report.
As organizations adopt hundreds of SaaS platforms, users are interconnecting thousands of third-party applications to critical platforms like Atlassian, Microsoft 365, Salesforce, Google Workspace, and Slack without any overs...
In today’s dynamic landscape of ever-expanding SaaS applications and data utilization, staying ahead of security threats is paramount for modern enterprises. The 2024 Forrester Con...
Today’s hybrid workforces primarily rely on Wi-Fi and cellular networks for critical business application connections. Unfortunately, these connections introduce wireless interfere...
GigaOm named Prisma Cloud a Leader in Cloud Security Posture Management (CSPM), Container Security, and now Cloud Infrastructure Entitlement Management (CIEM).
How do you respond to a security incident? In some cases, the answer might be ‘block first, ask questions later.’ That was common a decade ago in the centralized IT infrastructure....
Planning your schedule for the Google Cloud Next ‘24 event coming to the Mandalay Bay Convention Center in Las Vegas April 9–11? Please make some time...
When it comes to sensitive data, the ‘wild west’ approach that characterized the early 2000s is gone. Dozens of data protection frameworks have emerge...
Recent years have seen a flurry of new technologies and vendors — first in CSPM, and then DSPM. Dozens of products have emerged, in addition to existi...
Data is currency for modern businesses. Organizations use data analytics to make decisions about new products and services or to provide better custom...
Organizations are embracing the cloud to facilitate digital transformation, from lifting and shifting to building cloud-native applications. Utilizing...
Identity analytics is a critical cybersecurity tool in combating the challenges posed by compromised user accounts and malicious insiders. Identity th...
“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, cons...
“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, cons...
AI tends to be understood as one coherent field of study and application where similar solutions apply for all the use cases. The reality is that applying AI in real-world environm...
Managed security service providers (MSSPs) face the same problems as any security operations team: disparate tools, siloed data sources and inconsistent processes.
Unit 42 researchers discovered CVE-2024-1313, a broken object level authorization (BOLA) vulnerability in open-source data visualization platform Grafana. ...
We unravel the details of two large-scale StrelaStealer campaigns from 2023 and 2024. This email credential stealer has a new variant delivered through zipped J...
A surge in use of malware Smoke Loader by threat group UAC-0006 is highlighted in the first-ever joint research published by Unit 42 and SSSCIP Ukraine....
We analyze recent samples of BunnyLoader 3.0 to illuminate this malware’s evolved and upscaled capabilities, including its new downloadable module system....
Muddled Libra continues to evolve. From social engineering to adaptation of new technologies, significant time is spent breaking down organizational defenses....
This Wireshark tutorial guides the reader in exporting different packet capture objects. It builds on a foundation of malware traffic analysis skills. ...
Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.