To improve patient outcomes and experiences, today’s healthcare organizations are increasingly adopting innovative technologies, such as AI, Cloud, and IoT. While beneficial, these technologies increase risk by expanding the attack surface. Protecting the sensitive data at the heart of modern healthcare operations requires a rob...
To improve patient outcomes and experiences, today’s healthcare organizations are increasingly adopting innovative technologies, such as AI, Cloud, and IoT. While beneficial, these technologies increase risk by...
Before the launch of ChatGPT on Nov 30th 2022, people asked about the security implications of language models producing human fluent responses. The range of concerns were difficult to comprehend until the Public had access....
Palo Alto Networks recently returned from its eighth consecutive year as a sponsor of the 2024 National Collegiate Cyber Defense Competition (NCCDC) in San Antonio, Texas, where th...
As Chief Technology Officer for Unit 42 and a cybersecurity educator, I have a unique vantage point into the cyberthreat landscape. I recently had the honor of testifying before th...
In today’s threat landscape, the exponential growth of vulnerabilities makes it extremely challenging for network and security teams to prioritize remediation efforts and deliver...
As modern businesses evolve with today’s digital landscape, artificial intelligence (AI) has emerged as a transformative force, reshaping the way we work and redefining roles acros...
Read the Forrester Consulting Spotlight study commissioned by Palo Alto Networks to learn about a major component in our family of Next-Generation Firewalls (NGFWs): The VM-Series virtual firewall. You’ll disco...
As enterprises increasingly transition to the public cloud, they face a crucial decision: should they manage software firewalls in-house or outsource this critical function to experts? This question arises amon...
Palo Alto Networks has been named a leader in OT security in The Forrester Wave™: Operational Technology Security Solutions, Q2 2024 report. We receiv...
New capabilities that dramatically improve the end-to-end process of seeing and securing connected medical devices for network security and clinical engineering teams
CISA is requesting input on a new proposed rule that introduces a requirement for critical infrastructure organizations to report substantial cyber incidents and ransomware payment...
It’s no secret that GenAI tools like OpenAI’s ChatGPT and Google’s Gemini are shaking things up in the business world. They are totally transforming how we work, communicate, and innovate.
As modern businesses evolve with today’s digital landscape, artificial intelligence (AI) has emerged as a transformative force, reshaping the way we work and redefining roles across industries. As we stand on the cusp of a ne...
In today’s enterprise environment, the intricate web of interconnected SaaS applications, identity providers (IdP), and service accounts with disparate policies has made securing u...
As cyberattacks keep evolving, security and IT leaders find themselves implementing multiple solutions to ensure a secure, agile, and productive work environment. Yet many traditio...
In our last myth-busting blog post, we covered the myth surrounding points of presence (PoPs) and their impact on app performance. This post illuminates yet another fallacy: using caching servers to boost SaaS app performance...
Artificial intelligence (AI) is advancing rapidly, with organizations across myriad industries deploying AI-powered applications at an unprecedented pace. In The State of Cloud-Native Security Report 2024, for...
Prisma Cloud by Palo Alto Networks is a certified solution that supports the Red Hat OpenShift platform with more accurate, consistent and reliable ri...
Join us in Las Vegas as we showcase our Code to CloudTM platform at Black Hat, BSides and Def Con. You won’t want to miss the breakout and theater sessions, demos, parties, prizes...
Earlier this year, the National Institute of Standards and Technology (NIST) published a major revision to their Cybersecurity Framework (CSF), known...
Shadow IT and unmanaged cloud assets pose significant security risks for organizations. Prisma Cloud, in recent months, has addressed this visibility...
A new vulnerability in Open Secure Shell (OpenSSH), identified as Common Vulnerabilities and Exposures (CVE) CVE-2023-25136, poses a significant threa...
An unauthenticated remote code execution (RCE) vulnerability in OpenSSH’s server could potentially grant an attacker full root access, which poses a significant exploit risk. RegreSSHion, also known as CVE-2024-6387, was discovered by Qualys to be a regression bug of a...
A direct correlation between GenAI’s explosive popularity and scam attacks is addressed in this article, using plentiful data and a case study of network abus...
We explain how an automated BOLA detection tool harnessing GenAI discovered multiple BOLA vulnerabilities in open-source scheduling tool Easy!Appointments....
Malware analysts demonstrate how to triage and analyze large amounts of samples with greater efficiency. Samples include Remcos RAT, Lumma Stealer and more....
This article is a detailed study of CVE-2023-46229 and CVE-2023-44467, two vulnerabilities discovered by our researchers affecting generative AI framework LangC...
Ransomware gang RA World rebranded from RA Group. We discuss their updated tactics from leak site changes to an analysis of their operational tools. ...
Our data shows a pattern of APK malware bundled as BadPack files. We discuss how this technique is used to garble malicious Android files, creating challenges f...
Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.
Get the latest news, invites to events, and threat alerts