As applications move to the cloud and people work from anywhere, it’s becoming more important—and more difficult—to secure the web.| Palo Alto Networks
Join Paolo and his team as they protect the digital realm and stay ahead of today’s attackers with Palo Alto Networks Cloud-Delivered Security Services, powered by AI.| Palo Alto Networks
Advanced URL Filtering combines our renowned malicious URL database with the industry’s first real-time web protection engine powered by machine learning.| Palo Alto Networks
Dynamic-link library (DLL) hijacking remains a popular technique to run malware. We address its evolution using examples from the realm of cybercrime and more.| Unit 42
An overview of CVE-2024-3094, a vulnerability in XZ Utils impacting multiple Linux distributions, and information about how to mitigate.| Unit 42
Unit 42 details the just-discovered connection between threat group Stately Taurus (aka Mustang Panda) and the malware Bookworm, found during analysis of the group's infrastructure. Unit 42 details the just-discovered connection between threat group Stately Taurus (aka Mustang Panda) and the malware Bookworm, found during analysis of the group's infrastructure.| Unit 42
We recount an extensive cloud extortion campaign leveraging exposed .env files of at least 110k domains to compromise organizations' AWS environments.| Unit 42
Two ongoing campaigns bear hallmarks of North Korean state-sponsored threat actors, posing in job-seeking roles to distribute malware or conduct espionage.| Unit 42
Factory Reset Palo Alto Firewalls and networking equipment with just a few short steps to ensure that your configurations, settings & data are properly removed.| teletraders
In three campaigns over the past 20 months, Russian APT Fighting Ursa has targeted over 30 organizations of likely strategic intelligence value using CVE-2023-23397.| Unit 42