Security Operations

An Automated Response to Malicious Pod Activity

An Automated Response to Malicious Pod Activity

Automated playbook for effectively tackling malicious activity within Kubernetes clusters.
Aug 15, 2024
Black Hat NOC: Protecting One of the World's Most Dangerous Networks

Black Hat NOC: Protecting One of the World's Most Dangerous Networks

Palo Alto Networks and partners defend Black Hat's network, detecting and stopping nearly a billion threats, ensuring a seamless experience for attend...
Aug 09, 2024
Rapid Response for Fighting Ursa Phishing Campaign

Rapid Response for Fighting Ursa Phishing Campaign

Automated playbook to speed response to Russian threat actor, Fighting Ursa, APT phishing campaign offering diplomatic cars for sale.
Aug 08, 2024
Threat Hunting with Mark of The Web Using Cortex XDR

Threat Hunting with Mark of The Web Using Cortex XDR

Leveraging Mark of The Web (MOTW) data using Cortex XDR to hunt for suspicious files and malware downloaded from the internet
Aug 07, 2024

Subscribe to Security Operations Blogs!

Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.