Recent activity targeting telecom infrastructure is assessed with high confidence to overlap with Liminal Panda activity. The actors used custom tools, tunneling and OPSEC tactics for stealth. Recent activity targeting telecom infrastructure is assessed with high confidence to overlap with Liminal Panda activity. The actors used custom tools, tunneling and OPSEC tactics for stealth.| Unit 42
As applications move to the cloud and people work from anywhere, it’s becoming more important—and more difficult—to secure the web.| Palo Alto Networks
Join Paolo and his team as they protect the digital realm and stay ahead of today’s attackers with Palo Alto Networks Cloud-Delivered Security Services, powered by AI.| Palo Alto Networks
Advanced URL Filtering combines our renowned malicious URL database with the industry’s first real-time web protection engine powered by machine learning.| Palo Alto Networks
Dynamic-link library (DLL) hijacking remains a popular technique to run malware. We address its evolution using examples from the realm of cybercrime and more.| Unit 42
We recount an extensive cloud extortion campaign leveraging exposed .env files of at least 110k domains to compromise organizations' AWS environments.| Unit 42
A deep-dive into the evolution of security orchestration and automation response solutions (SOAR) and the future AI-native automation platforms.| softwareanalyst.substack.com
How Cloud-Native Next-Gen SIEMs, XDR platforms and Security data lakes are displacing legacy SIEM solutions| softwareanalyst.substack.com