Cortex XDR Is the Only Endpoint Security Market Leader Certified in Both AVC...
For security operations teams, the efficacy of your endpoint detection and response (EDR) solution is not just about collecting data, it's about receiving timely and actionable intelligence that...
View ArticleWhy Integrated File Integrity Monitoring Matters for Elevating Your Security
Maintaining the integrity of critical systems is paramount for security managers, including the IT infrastructure and sensitive business data, like financial records or intellectual property....
View ArticleThe Challenge of Cybersecurity Frenemies and Collaboration
{{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider The cybersecurity industry faces a peculiar paradox: companies that compete fiercely for customers must collaborate...
View ArticleSecurity Operations Under Fire Inside Black Hat's NOC
Black Hat stands as one of the world's most challenging cybersecurity events, where researchers unveil zero-day exploits, trainers demonstrate attack techniques and thousands of security professionals...
View ArticlePalo Alto Networks and MITRE ATT&CK® Evaluations: Enterprise 2025
At Palo Alto Networks, we are relentlessly focused on delivering the best security for our customers. A key part of that commitment is engaging in independent, third-party testing to validate our...
View ArticleSCCM: Enterprise Backbone or Attack Vector?
Introduction What is SCCM? Microsoft System Center Configuration Manager (also known as SCCM) is a core component of enterprise IT infrastructure, enabling centralized software and device management of...
View ArticleSCCM: Enterprise Backbone or Attack Vector? Part 2
Introduction The first part of this blog post explored SCCM architecture and initial reconnaissance; this second part will delve into advanced attack phases like credential access and persistence. We...
View ArticleRaising the Bar for Incident Response
Palo Alto Networks Unit 42 Recognised by UK’s NCSC as an Enhanced Level Cyber Incident Response Assured Service Provider The UK’s National Cyber Security Centre (NCSC) has officially added Palo Alto...
View ArticleCortex XDR is the Only Endpoint Security Market Leader to Achieve 99% in Both...
In today's cybersecurity landscape, achieving superior protection doesn't have to come at a premium. The AV-Comparatives 2025 EPR Product Validation Report1 demonstrates that Palo Alto Networks Cortex...
View ArticleThe Ransomware Speed Crisis
When Cybercriminals Beat the Clock The dramatic acceleration of ransomware attacks now occurs at machine speed, completing in minutes rather than days. This shift is driven by AI-powered tactics and...
View ArticleDefending against Phantom Taurus with Cortex
After a two-and-a-half-year investigation, Palo Alto Networks Unit 42 has formally named a sophisticated, Chinese nation-state actor: Phantom Taurus. As this advanced adversary poses a significant...
View ArticleThe Case for Multidomain Visibility
Findings from the 2025 Unit 42 Global Incident Response Report Cyberattacks rarely follow a linear path. While security teams often zero-in on initial access vectors, like phishing emails, exposed...
View ArticleStopping Cross-Domain Attacks with Cortex XDL + Cortex XSIAM
The Invisible Crisis in Your Security Operations Picture this: your security team is drowning in an ocean of alerts while sophisticated attackers move through your environment undetected. Each security...
View ArticleDiscover the Power of Next-Gen Automation in XSIAM 3.x
The evolution of security operations demands increasingly efficient and accessible automation. To achieve faster threat response and optimize resource allocation, security teams need to implement...
View ArticleFrom Silos to Synergy: How Cortex XDL Transforms XDR to Elevate Threat Detection
Security teams today are facing a new reality. While we have more data than ever before, the sheer volume can be overwhelming, making it difficult to find the actionable intelligence needed to stop...
View ArticleThe Case Files of Detective Aems: A Study in Digital Deduction
{{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider Being an Account of Several Most Remarkable Cases of Electronic Mail Fraud, as Related by Dr. Watson of the Digital...
View ArticleReal-World Email Attacks Detected by Cortex Advanced Email Security
Disclaimer: The company names and brands referenced in this blog post are mentioned solely as examples of cybercriminals fraudulently impersonating these legitimate organizations. These references do...
View ArticleHow Cortex Defends Against Microsoft SharePoint "ToolShell" Exploits
Recent alerts from Unit 42 have identified a critical threat to self-hosted Microsoft SharePoint servers. A sophisticated attack chain, dubbed "ToolShell," is actively exploiting multiple...
View ArticleBreaking Down Security Silos: How XDL Powers Advanced Threat Operations
Your security backlog grows because traditional defenses are fragmented. While modern cyberattacks cross network, email, and cloud boundaries in a single campaign, security tools remain in isolated...
View ArticleSIEM Replacement Made Easy (Yes, Really!)
Transform your SOC in record time with Cortex XSIAM Many security leaders are ready to break free from legacy SIEMs and finally run a SOC that’s unified, intelligent and efficient. They want to replace...
View Article