AI in Cyber Is Here to Stay — How to Weather This Sea Change

“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, consulting, engineering and more. Our objective is to present different viewpoints and predictions on how artificial intelligence is impacting the current threat landscape, how Palo Alto Networks protects itself and its customers, as well as implications for the future of cybersecurity. ...

May 22, 2024

Corporate Blogs

AI in Cyber Is Here to Stay — How to Weather This Sea Change
“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI rese...
May 22, 2024
Counter AI Attacks with AI Defense
While artificial intelligence (AI) technology has been around for a while, there is no arguing that it has become mainstream over the last year. Whenever new technology becomes mainstream, everyone looks for ways to use it to...
May 07, 2024
Prisma SASE 3.0 — Securing Work Where It Happens
In today's work environment, employees demand the freedom to be productive from anywhere, using any device, and accessing any applicati...
May 02, 2024
AI's Offensive & Defensive Impacts
As the hype around AI continues to ramp up, cybersecurity practitioners are trying to separate reality from fiction when it comes to how artificial intelligence will impact their field. Our discussion includes some candid pre...
May 01, 2024
Cybersecurity Platformization
The debate over cybersecurity platforms versus “best-of-breed” point solutions has been a hot topic within the cybersecurity industry for years. Platform solutions have often been criticized for capabilities that are only “go...
Apr 26, 2024
More on the PAN-OS CVE-2024-3400
On April 10, 2024 Palo Alto Networks Product Security Incident Response Team (PSIRT) learned of a suspicious exfiltration attempt at a customer site from Volexity's Steven Adair. O...
Apr 19, 2024
Palo Alto Networks Recognized by Gartner as a Leader in SSE Report
Today, Palo Alto Networks is proud to announce that it has been named a Leader in the 2024...
Apr 18, 2024
The Evolving Threat of Ransomware — A Call to Action for Cybersecurity
In the ever-evolving landscape of cybersecurity, the specter of ransomware looms larger than ever before. Once considered merely an IT...
Apr 17, 2024

Network Security Blogs

Putting More Cure In Secure With Medical IoT Security
New capabilities that dramatically improve the end-to-end process of seeing and securing connected medical devices for network security and clinical engineering teams
May 20, 2024
Manufacturers key target for CIRCIA cyber incident reporting rule
CISA is requesting input on a new proposed rule that introduces a requirement for critical infrastructure organizations to report substantial cyber incidents and ransomware payment...
May 14, 2024
Untangling IT-OT Security Knots with a Zero Trust Platform Approach
Organizations today are grappling with the complexities of digital transformation, a shifting threat landscape with the...
May 13, 2024
Strengthening Your DNS Protection with Advanced DNS Security
The intensity of today’s threat landscape has put organizations at greater risk of a breach. However, vulnerability can be looked at as the birthplace...
May 08, 2024
Strata Copilot - Accelerating to an Autonomous Cybersecurity Future
Today, Palo Alto Networks is sharing its vision for fully autonomous cybersecurity at our virtual event Prepare for a Brand-New Fight. As part of that...
May 07, 2024
A Brand New Fight: Securing Your AI-Powered Applications
How do you unleash the competitive edge that comes from game-changing technologies while simultaneously keeping them secure? It’s a burning question for security professionals looking for ways to embrace AI usa...
May 07, 2024
PAN-OS 11.2 Quasar Helps Customers Secure Networks Everywhere, Faster
The future of secure networking is here with PAN-OS 11.2 Quasar, Quantum-Safe VPN, ADEM for next-generation firewalls, Advanced DNS Security and the introduction of new ruggedized...
May 02, 2024
Google Cloud and Palo Alto Networks Deliver Cloud-Native NGFW Service
Google Cloud and Palo Alto Networks are excited to announce the general availability of Google Cloud Next-Generation Firewall (NGFW) Enterprise. Power...
Apr 11, 2024

SASE Blogs

Managed SD-WAN Services for MSPs Unlock New Revenue Streams
Businesses are adopting cloud-driven services at an unprecedented rate and utilizing SaaS apps to deliver their services. With the hybrid workforce here to stay, enterprises are ch...
May 16, 2024
Uncover Suspicious SaaS Activities with Behavior Threats
Safeguarding enterprise data is paramount in today’s fast-paced world of cloud-based business services and operations.
May 15, 2024
Myth Busting the PoP Fallacy
At Palo Alto Networks, we innovate based on first principles across security, performance, and availability. As part of our continued commitment to our customers, we constantly benchmark apps and infrastructure to identify th...
May 13, 2024
The Dark Secret of Enterprise Security
It's the challenge of securing unmanaged devices in a world where remote work, contractors, and Bring Your Own Device (BYOD) are common.
May 09, 2024
Strata Copilot - Accelerating to an Autonomous Cybersecurity Future
Today, Palo Alto Networks is sharing its vision for fully autonomous cybersecurity at our virtual event Prepare for a Brand-New Fight....
May 07, 2024
A Brand New Fight: Securing Your AI-Powered Applications
How do you unleash the competitive edge that comes from game-changing technologies while simultaneously keeping them secure? It’s a burning question for security professionals look...
May 07, 2024
The Critical Role of Enterprise Browsers in a SASE Framework
From hybrid work models to AI assistance, today’s workplace is all about maximizing productivity. Modern organizations are transitionin...
May 02, 2024
Prisma SASE 3.0 — Securing Work Where It Happens
In today's work environment, employees demand the freedom to be productive from anywhere, using any device, and accessing any applicati...
May 02, 2024

Cloud Native Security Blogs

Operate Efficiently and Securely: Rotating Prisma Cloud Access Keys
Ensuring appropriate access management is a critical component of any effective cloud security strategy. Take this real-world scenario, for example.
May 21, 2024
Why Code to Cloud™, Data Security and Platforms Matter in Cloud Security
If anyone knows about the importance of rapid response when it comes to effectively solving cloud security issues, it's Bill Ho, a Prisma Cloud Solution Architect and expert on clo...
May 14, 2024
Prisma Cloud Copilot: Don’t Just Ask, Act
Generative AI's acceleration of software delivery is straining current approaches to cloud security, making scaling nearly impossible because, as Gartner points out, organizations don’t have the skilled resourc...
May 07, 2024
Announcing Prisma Cloud AI-SPM: Security and Compliance for AI-Powered Apps
As artificial intelligence (AI) becomes ubiquitous, it introduces security challenges that have never been considered. AI security posture management...
May 07, 2024
Best Practices for Managing Vulnerabilities in the Cloud
If you’ve ever questioned the importance of vulnerability management, consider these facts:To make matters worse, attackers are wasting no time in taking advantage of this wave, exploiting vulnerabilities withi...
May 02, 2024
Secure State and Local Cloud Modernization Efforts
In its commitment to be the state and local government's cybersecurity partner of choice, Prisma Cloud by Palo Alto Networks has achieved StateRAMP Authorized status, providing unparalleled security for moderni...
Apr 25, 2024
Security Theater: Don’t Hang your Hat on Compliance
Security breaches can cost millions. Everyone answers to someone — whether it's a manager, director, CISO, CEO or the company board. They’re going to want to know how security teams are protecting their infrast...
Apr 18, 2024
Prisma Cloud Adds Telecommunications Security Act Compliance Framework
Prisma Cloud has added the Telecommunications Security Act to its list of out-of-the-box compliance standards. With this release, public electronic co...
Apr 17, 2024

Security Operations Blogs

Securing Kubernetes Clusters: The Cortex XDR and XSIAM Approach
Kubernetes has revolutionized the way we deploy and manage applications, but its complexity and dynamic nature also introduce a new set of security ch...
May 14, 2024
AI in Cyber Is Here to Stay — How to Weather This Sea Change
“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, cons...
May 22, 2024
Prowling the Wilds — Upgrade Your SOC and Hunt Down Threats
It would be nice to imagine our SOC analysts as the apex predators of the IT jungle, stalking the network perimeter and tracking the scent of trespassing attackers. But, for most S...
May 21, 2024
By 
The Dark Side of AI in Cybersecurity — AI-Generated Malware
“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, cons...
May 15, 2024
Playbook of the Week: Automating Response to Living-Off-the-Land (LOTL) Attacks
Organizations face increasingly sophisticated cyberattacks in today's rapidly evolving threat landscape. Attackers leverage common tool...
May 09, 2024
Cortex Copilot - In SecOps, You Should Secure Smarter, Not Harder
There are a lot of moving parts in security operations. As cyberthreats continue advancing in speed and complexity, analysts must inves...
May 07, 2024
AI's Offensive & Defensive Impacts
As the hype around AI continues to ramp up, cybersecurity practitioners are trying to separate reality from fiction when it comes to how artificial intelligence will impact their field. Our discussion includes some candid pre...
May 01, 2024
Leading with a Prevention-First Approach for Cloud Detection and Response
As cloud computing continues to evolve and becomes the ad-hoc standard for many of the world’s largest enterprises, we also see attack surfaces growing and the escalation of cybert...
Apr 17, 2024

Unit 42 Threat Research

company article
We detail Operation MidnightEclipse, a campaign exploiting command injection vulnerability CVE-2024-3400, and include protections and mitigations....
April 12, 2024
By  Unit 42
company article
This article examines the distribution of malicious payloads embedded in Microsoft OneNote files by type, a first in our research to do so at such a scale....
May 16, 2024
company article
We provide a walkthrough of how attackers leverage DNS tunneling for tracking and scanning, an expansion of the way this technique is usually exploited. ...
May 13, 2024
company article
Muddled Libra now actively targets CSP environments and SaaS applications. Using the MITRE ATT&CK framework, we outline observed TTPs from incident response....
April 9, 2024
company article
We describe the characteristics of malware-initiated scanning attacks. These attacks differ from direct scanning and are increasing according to our data....
company article
An overview of CVE-2024-3094, a vulnerability in XZ Utils, and information about how to mitigate....
March 30, 2024
By  Unit 42
company article
Unit 42 researchers discovered CVE-2024-1313, a broken object level authorization (BOLA) vulnerability in open-source data visualization platform Grafana. ...
March 27, 2024
company article
We analyze the actions of two separate Chinese APTs — including Stately Taurus — that targeted ASEAN-affiliated entities through different methods....
March 26, 2024
By  Unit 42

Subscribe to the Newsletter!

Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.