As applications move to the cloud and people work from anywhere, it’s becoming more important—and more difficult—to secure the web.| Palo Alto Networks
Join Paolo and his team as they protect the digital realm and stay ahead of today’s attackers with Palo Alto Networks Cloud-Delivered Security Services, powered by AI.| Palo Alto Networks
Advanced URL Filtering combines our renowned malicious URL database with the industry’s first real-time web protection engine powered by machine learning.| Palo Alto Networks
CL-STA-1020 targets Southeast Asian governments using a novel Microsoft backdoor we call HazyBeacon. It misuses AWS Lambda URLs for C2. CL-STA-1020 targets Southeast Asian governments using a novel Microsoft backdoor we call HazyBeacon. It misuses AWS Lambda URLs for C2.| Unit 42
We recount an extensive cloud extortion campaign leveraging exposed .env files of at least 110k domains to compromise organizations' AWS environments.| Unit 42
Extended detection and response tools provide a deeper and more automated means to identify and respond to threats. These are some of the most popular options.| CSO Online
Two ongoing campaigns bear hallmarks of North Korean state-sponsored threat actors, posing in job-seeking roles to distribute malware or conduct espionage.| Unit 42
In three campaigns over the past 20 months, Russian APT Fighting Ursa has targeted over 30 organizations of likely strategic intelligence value using CVE-2023-23397.| Unit 42