Corporate Blogs

The Next Wave of Cybersecurity

The Next Wave of Cybersecurity

Traditional cloud security fails against real-time attacks. Protect with a unified approach: best-in-class CDR combined with industry-leading CNAPP.
Jun 20, 2025
Improving National Security Through Secure AI

Improving National Security Through Secure AI

Wendi Whitmore spoke on a panel of witnesses at a field hearing at Stanford’s Hoover Institution on May 28, outlining the AI innovations our team developed.
May 29, 2025
Cortex XDR Named 2025 Gartner Customers’ Choice for Endpoint Security

Cortex XDR Named 2025 Gartner Customers’ Choice for Endpoint Security

98% of reviewers recommend Palo Alto Networks industry-leading security, Cortex XDR, as Gartner Customers' Choice for Endpoint Protecti...
May 28, 2025
A 3X Leader in Gartner 2025 Magic Quadrant for SSE

A 3X Leader in Gartner 2025 Magic Quadrant for SSE

Palo Alto Networks has been named a Leader in the 2025 Gartner Magic Quadrant for Security Service Edge, for the third time.
May 23, 2025
Cortex Cloud — Unified Efficiency, Now with Dual FedRAMP Authority

Cortex Cloud — Unified Efficiency, Now with Dual FedRAMP Authority

Cortex Cloud achieved FedRAMP High and Moderate authorizations since its Feb 2025 launch, highlighting its secure cloud commitment.
May 21, 2025
Unit 42 Develops Agentic AI Attack Framework

Unit 42 Develops Agentic AI Attack Framework

Threat actors are advancing AI strategies and outpacing traditional security. CXOs must critically examine AI weaponization across the attack chain.
May 14, 2025
By 
Advancing Cybersecurity in Australia

Advancing Cybersecurity in Australia

Government organisations and critical infrastructure entities are the custodians of some of the most important and sensitive data in the world. This data and the systems that they process underpin some of the most fundamental...
May 13, 2025
Palo Alto Networks: Champion in Two Canalys Global Leadership Matrices

Palo Alto Networks: Champion in Two Canalys Global Leadership Matrices

A Champion in 2 Canalys Global Leadership matrices for 2025 showcases our commitment to partner/customer success with AI-powered cybers...
May 08, 2025

Network Security Blogs

A Bold New Vision in Cloud Network Security for the Future of Work

A Bold New Vision in Cloud Network Security for the Future of Work

Palo Alto Networks introduces four groundbreaking innovations to its Software Firewalls portfolio. Find out more.
Jun 25, 2025
Cloud NGFW is Essential for AWS & Azure Cloud Traffic Protection

Cloud NGFW is Essential for AWS & Azure Cloud Traffic Protection

Get unparalleled threat prevention, operational simplicity and significant TCO savings with Cloud NGFW.
Jun 24, 2025
How Secure Are Your AI and Cloud Environments? Just Ask CLARA

How Secure Are Your AI and Cloud Environments? Just Ask CLARA

With complimentary Cloud and AI Risk Assessment (CLARA) services, you can see how well your network security works in AI and public cloud environments.
Jun 23, 2025
See How We’re Fortifying Cloud and AI at AWS re:Inforce 2025

See How We’re Fortifying Cloud and AI at AWS re:Inforce 2025

Join Palo Alto Networks at AWS re:Inforce '25. Connect with security experts and discover actionable solutions to AWS security challenges.
Jun 12, 2025
Securing AI Agent Innovation with Prisma AIRS MCP Server

Securing AI Agent Innovation with Prisma AIRS MCP Server

Prisma AIRS MCP Server is now available for public preview via PyPI/Github sample code. The new component of the platform helps customers secure AI ag...
Jun 09, 2025
GenAI's Impact — Surging Adoption and Rising Risks in 2025

GenAI's Impact — Surging Adoption and Rising Risks in 2025

Explore how GenAI is reshaping enterprise operations and how to mitigate rising risks.
Jun 05, 2025
Empowering AI Agent Developers with Prisma AIRS Python SDK

Empowering AI Agent Developers with Prisma AIRS Python SDK

The Prisma AIRS Python SDK helps developers address the growing need to secure AI applications and AI agents.
May 28, 2025
You Can’t Spell Platformization Without IoT

You Can’t Spell Platformization Without IoT

As many organizations race to simplify and strengthen their security posture, many are overlooking a critical element: IoT devices.
May 22, 2025

SASE Blogs

Examining the Coffee Shop Model and SASE

Examining the Coffee Shop Model and SASE

Although alluring, the coffee shop model doesn't meet enterprise networking & security standards. Consider the Zero Trust Branch model instead.
Jun 11, 2025
A Secure Browser Requires a World-Class Cyber Research Team

A Secure Browser Requires a World-Class Cyber Research Team

If security is your priority, you need a browser built by the best minds in the industry—one that evolves as fast as the threats do.
Jun 04, 2025
Introducing Prisma Access Agent: The Future of Secure Connectivity

Introducing Prisma Access Agent: The Future of Secure Connectivity

Prisma Access Agent offers the visibility, robust protection & high performance needed to securely & efficiently support the distribute...
Jun 02, 2025
Secure M&As and Accelerate Time-to-Value with Prisma Access Browser

Secure M&As and Accelerate Time-to-Value with Prisma Access Browser

Prisma® Access Browser enables organizations undergoing a merger or acquisition to quickly provide employees secure access on any devic...
May 28, 2025
Unlocking Unmatched Performance, Scale & Resilience with Prisma SASE

Unlocking Unmatched Performance, Scale & Resilience with Prisma SASE

Prisma SASE has expanded its global reach and cybersecurity protections through an expanded partnership with Oracle Cloud Infrastructur...
May 27, 2025
A 3X Leader in Gartner 2025 Magic Quadrant for SSE

A 3X Leader in Gartner 2025 Magic Quadrant for SSE

Palo Alto Networks has been named a Leader in the 2025 Gartner Magic Quadrant for Security Service Edge, for the third time.
May 23, 2025
Solving Data Security in the AI-Powered Work Era

Solving Data Security in the AI-Powered Work Era

Palo Alto Networks delivers AI-driven innovations in data security to help safeguard sensitive data today and in the AI-powered future.
May 15, 2025
Advancing Cybersecurity in Australia

Advancing Cybersecurity in Australia

Government organisations and critical infrastructure entities are the custodians of some of the most important and sensitive data in the world. This data and the systems that they process underpin some of the most fundamental...
May 13, 2025

Cloud Security Blogs

Cloud Attack Surface Management: See What Other CNAPPs Miss

Cloud Attack Surface Management: See What Other CNAPPs Miss

Cloud attack surface management identifies unmanaged, internet-exposed assets and brings them under control to reduce risk across multicloud environme...
Jun 24, 2025
The New AI Attack Surface — How Cortex Cloud Secures MCP

The New AI Attack Surface — How Cortex Cloud Secures MCP

MCP Security in Cortex Cloud protects AI applications by securing Model Context Protocol communications and detecting API-layer threats in real time.
Jun 13, 2025
The Best Cloud Threat Detection Just Got Better

The Best Cloud Threat Detection Just Got Better

Cortex Cloud Detection and Response now adds real-time malware protection, expanded threat detection, and built-in automation to help security teams act faster.
Jun 12, 2025
Kubernetes: A Practitioner’s Guide to KSPM

Kubernetes: A Practitioner’s Guide to KSPM

Prioritize and secure Kubernetes with real-time insights, risk-driven workflows, and full asset visibility—powered by Cortex Cloud’s KSPM capabilities.
Jun 10, 2025
Model Context Protocol (MCP): A Security Overview

Model Context Protocol (MCP): A Security Overview

Model Context Protocol (MCP) introduces new AI integration risks. Learn how to manage threats like prompt injection, credential leaks, and toolchain abuse.
Jun 06, 2025
Anatomy of a Kubernetes Attack: How Cortex Cloud Provides End-to-End Protection

Anatomy of a Kubernetes Attack: How Cortex Cloud Provides End-to-End Protec...

Kubernetes attack detection requires unified visibility. See how Cortex Cloud stops multistage threats across app, container, host and cloud identity ...
May 20, 2025
Cortex Cloud Stands Alone to Secure Mission-Critical Workloads with FedRAMP High and Moderate

Cortex Cloud Stands Alone to Secure Mission-Critical Workloads with FedRAMP...

Cortex Cloud earns FedRAMP High and Moderate, becoming the only CNAPP with both. Delivering real-time cloud security for mission-critical government w...
May 15, 2025
The Rise of AI-Powered IDEs: What the Windsurf Acquisition News Mean for Security Teams

The Rise of AI-Powered IDEs: What the Windsurf Acquisition News Mean for Se...

Cortex Cloud helps security teams prepare for AI-powered IDEs in the wake of OpenAI’s Windsurf acquisition, securing code and risks across the lifecyc...
May 12, 2025

Security Operations Blogs

The Next Wave of Cybersecurity

The Next Wave of Cybersecurity

Traditional cloud security fails against real-time attacks. Protect with a unified approach: best-in-class CDR combined with industry-leading CNAPP.
Jun 20, 2025
Baby Tigers Bite — The Hidden Risks of Scaling AI Too Fast

Baby Tigers Bite — The Hidden Risks of Scaling AI Too Fast

AI systems scale from prototypes to production environments, as do the risks. Is your organization planning for the AI baby tiger or full-grown AI predator?
Jun 17, 2025
Modern SIEM Journeys: Notes from the Migration Trail

Modern SIEM Journeys: Notes from the Migration Trail

Energy, finance and insurance SOCs cut alert noise 75% and MTTR 98% by moving from legacy SIEM to Cortex XSIAM’s unified, AI-driven security platform.
Jun 17, 2025
Beyond the Label: How AI-Driven Explanations Supercharge Malware Detection

Beyond the Label: How AI-Driven Explanations Supercharge Malware Detection

Go beyond 'malicious' or 'benign'. Learn how Palo Alto Networks uses AI explanations to enhance the development of our malware detection to get more accurate verdicts.
Jun 10, 2025
Inside a Modern Cloud Attack — How to Catch It with Cortex CDR

Inside a Modern Cloud Attack — How to Catch It with Cortex CDR

Learn how Cortex CDR detects modern cloud attacks like Scattered Spider's identity-driven campaigns across Okta, AWS & Office 365 with ...
Jun 05, 2025
Cybersecurity Challenges in the Energy and Utilities Sector

Cybersecurity Challenges in the Energy and Utilities Sector

IBM and Palo Alto Networks are collaborating to address five key security challenges and their solutions.
Jun 03, 2025
Cortex XDR Named 2025 Gartner Customers’ Choice for Endpoint Security

Cortex XDR Named 2025 Gartner Customers’ Choice for Endpoint Security

98% of reviewers recommend Palo Alto Networks industry-leading security, Cortex XDR, as Gartner Customers' Choice for Endpoint Protecti...
May 28, 2025
Across the Logs and Into Cortex XSIAM

Across the Logs and Into Cortex XSIAM

Learn how Cortex XSIAM streamlines SIEM migration with 1000+ connectors, 10,000+ detectors & native automation. Complete traditional SIEM upgrade in 3 months
May 22, 2025

Unit 42 Threat Research

company article

Threat Brief: Operation Lunar Peek, Activity Related to CVE-2024-...

We detail the observed limited activity regarding authentication bypass vulnerability CVE-2024-0012 affecting specific versions of PAN-OS software, and include ...
November 22, 2024
By  Unit 42
company article

The Risks of Code Assistant LLMs: Harmful Content, Misuse and Dec...

We examine security weaknesses in LLM code assistants. Issues like indirect prompt injection and model misuse are prevalent across platforms....
September 15, 2025
company article

Trusted Connections, Hidden Risks: Token Management in the Third-...

Effective OAuth token management is crucial for supply chain security, preventing breaches caused by dormant integrations, insecure storage or lack of rotation....
September 12, 2025
company article

AdaptixC2: A New Open-Source Framework Leveraged in Real-World At...

AdaptixC2, an open-source C2 framework, is increasingly used in attacks. We discuss its features and potential use case scenarios....
September 10, 2025
company article

Data Is the New Diamond: Latest Moves by Hackers and Defenders

Unit 42 delves into how cybercriminals are treating stolen data like digital diamonds amid rising attacks and evolving extortion tactics....
September 9, 2025
company article

Model Namespace Reuse: An AI Supply-Chain Attack Exploiting Model...

Model namespace reuse is a potential security risk in the AI supply chain. Attackers can misuse platforms like Hugging Face for remote code execution....
September 3, 2025
company article

Why Threat Intelligence: A Conversation With Unit 42 Interns

Discover what it’s like to be a Threat Intelligence intern at Unit 42, from diving into research to tackling real-world cyber threats....
September 2, 2025
company article

Threat Brief: Salesloft Drift Integration Used To Compromise Sale...

This Threat Brief discusses observations on a campaign leveraging Salesloft Drift integration to exfiltrate data via compromised OAuth credentials....
September 2, 2025
By  Unit 42

Subscribe to the Newsletter!

Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.