Quantcast
Channel: Cortex XDR: Once, Twice, Three Times a Leader - Palo Alto Networks Blog
Browsing all 154 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Cortex XDR Is the Only Endpoint Security Market Leader Certified in Both AVC...

For security operations teams, the efficacy of your endpoint detection and response (EDR) solution is not just about collecting data, it's about receiving timely and actionable intelligence that...

View Article


Image may be NSFW.
Clik here to view.

Why Integrated File Integrity Monitoring Matters for Elevating Your Security

Maintaining the integrity of critical systems is paramount for security managers, including the IT infrastructure and sensitive business data, like financial records or intellectual property....

View Article


Image may be NSFW.
Clik here to view.

The Challenge of Cybersecurity Frenemies and Collaboration

{{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider The cybersecurity industry faces a peculiar paradox: companies that compete fiercely for customers must collaborate...

View Article

Image may be NSFW.
Clik here to view.

Security Operations Under Fire Inside Black Hat's NOC

Black Hat stands as one of the world's most challenging cybersecurity events, where researchers unveil zero-day exploits, trainers demonstrate attack techniques and thousands of security professionals...

View Article

Palo Alto Networks and MITRE ATT&CK® Evaluations: Enterprise 2025

At Palo Alto Networks, we are relentlessly focused on delivering the best security for our customers. A key part of that commitment is engaging in independent, third-party testing to validate our...

View Article


Image may be NSFW.
Clik here to view.

SCCM: Enterprise Backbone or Attack Vector?

Introduction What is SCCM? Microsoft System Center Configuration Manager (also known as SCCM) is a core component of enterprise IT infrastructure, enabling centralized software and device management of...

View Article

Image may be NSFW.
Clik here to view.

SCCM: Enterprise Backbone or Attack Vector? Part 2

Introduction The first part of this blog post explored SCCM architecture and initial reconnaissance; this second part will delve into advanced attack phases like credential access and persistence. We...

View Article

Raising the Bar for Incident Response

Palo Alto Networks Unit 42 Recognised by UK’s NCSC as an Enhanced Level Cyber Incident Response Assured Service Provider The UK’s National Cyber Security Centre (NCSC) has officially added Palo Alto...

View Article


Image may be NSFW.
Clik here to view.

Cortex XDR is the Only Endpoint Security Market Leader to Achieve 99% in Both...

In today's cybersecurity landscape, achieving superior protection doesn't have to come at a premium. The AV-Comparatives 2025 EPR Product Validation Report1 demonstrates that Palo Alto Networks Cortex...

View Article


Image may be NSFW.
Clik here to view.

The Ransomware Speed Crisis

When Cybercriminals Beat the Clock The dramatic acceleration of ransomware attacks now occurs at machine speed, completing in minutes rather than days. This shift is driven by AI-powered tactics and...

View Article

Defending against Phantom Taurus with Cortex

After a two-and-a-half-year investigation, Palo Alto Networks Unit 42 has formally named a sophisticated, Chinese nation-state actor: Phantom Taurus. As this advanced adversary poses a significant...

View Article

The Case for Multidomain Visibility

Findings from the 2025 Unit 42 Global Incident Response Report Cyberattacks rarely follow a linear path. While security teams often zero-in on initial access vectors, like phishing emails, exposed...

View Article

Image may be NSFW.
Clik here to view.

Stopping Cross-Domain Attacks with Cortex XDL + Cortex XSIAM

The Invisible Crisis in Your Security Operations Picture this: your security team is drowning in an ocean of alerts while sophisticated attackers move through your environment undetected. Each security...

View Article


Image may be NSFW.
Clik here to view.

Discover the Power of Next-Gen Automation in XSIAM 3.x

The evolution of security operations demands increasingly efficient and accessible automation. To achieve faster threat response and optimize resource allocation, security teams need to implement...

View Article

Image may be NSFW.
Clik here to view.

From Silos to Synergy: How Cortex XDL Transforms XDR to Elevate Threat Detection

Security teams today are facing a new reality. While we have more data than ever before, the sheer volume can be overwhelming, making it difficult to find the actionable intelligence needed to stop...

View Article


Image may be NSFW.
Clik here to view.

The Case Files of Detective Aems: A Study in Digital Deduction

{{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider Being an Account of Several Most Remarkable Cases of Electronic Mail Fraud, as Related by Dr. Watson of the Digital...

View Article

Image may be NSFW.
Clik here to view.

Real-World Email Attacks Detected by Cortex Advanced Email Security

Disclaimer: The company names and brands referenced in this blog post are mentioned solely as examples of cybercriminals fraudulently impersonating these legitimate organizations. These references do...

View Article


How Cortex Defends Against Microsoft SharePoint "ToolShell" Exploits

Recent alerts from Unit 42 have identified a critical threat to self-hosted Microsoft SharePoint servers. A sophisticated attack chain, dubbed "ToolShell," is actively exploiting multiple...

View Article

Image may be NSFW.
Clik here to view.

Breaking Down Security Silos: How XDL Powers Advanced Threat Operations

Your security backlog grows because traditional defenses are fragmented. While modern cyberattacks cross network, email, and cloud boundaries in a single campaign, security tools remain in isolated...

View Article

Image may be NSFW.
Clik here to view.

SIEM Replacement Made Easy (Yes, Really!)

Transform your SOC in record time with Cortex XSIAM Many security leaders are ready to break free from legacy SIEMs and finally run a SOC that’s unified, intelligent and efficient. They want to replace...

View Article
Browsing all 154 articles
Browse latest View live


Latest Images