The AI Action Plan validates the enormous potential of AI – it must be developed and deployed securely, laying out tactical steps for a secure AI future.
Leveraging Rubrik in Cortex XSOARRubrik and Cortex XSOAR are excited to share that the new Rubrik Polaris content pack and integration is now available w...
Shining a Light on Log4j Exploit PayloadsCortex XDR Managed Threat Hunting deep-dive into rarely seen payloads attackers have attempted to execute using the Log4...
The AI Action Plan validates the enormous potential of AI – it must be developed and deployed securely, laying out tactical steps for a secure AI future.
Regulatory frameworks in Europe call for solutions delivering strong cybersecurity, operational resilience and support organization's control over their data.
With complimentary Cloud and AI Risk Assessment (CLARA) services, you can see how well your network security works in AI and public cloud environments.
Prisma AIRS MCP Server is now available for public preview via PyPI/Github sample code. The new component of the platform helps customers secure AI ag...
Prisma SASE provides a secure, isolated and scalable way to navigate the complexities of digital transformation and the evolving nature of cyberthreats.
Cloud attack surface management, file integrity monitoring, and Microsoft 365 DSPM lead Cortex Cloud’s innovations to eliminate blind spots and secure data.
Cloud-based data breaches expose high-risk assets to the internet. Learn how to validate, prioritize and remediate external exposure with External Probe Validation.
AI security posture management gives CISOs full visibility, safeguards AI data, and blocks prompt injection or model poisoning to speed secure innovation.
Cloud attack surface management identifies unmanaged, internet-exposed assets and brings them under control to reduce risk across multicloud environme...
Cortex Cloud Detection and Response now adds real-time malware protection, expanded threat detection, and built-in automation to help security teams act faster.
We detail the observed limited activity regarding authentication bypass vulnerability CVE-2024-0012 affecting specific versions of PAN-OS software, and include ...
Recent activity targeting telecom infrastructure is assessed with high confidence to overlap with Liminal Panda activity. The actors used custom tools, tunnelin...
Muddled Libra (Scattered Spider, UNC3944) is evolving. Get the latest insights and defensive recommendations based on Unit 42 incident response cases....
Cloud logging is essential for security and compliance. Learn best practices when navigating AWS, Azure or GCP for comprehensive visibility into your environmen...
SLOW#TEMPEST malware uses dynamic jumps and obfuscated calls to evade detection. Unit 42 details these techniques and how to defeat them with emulation....
Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.
Get the latest news, invites to events, and threat alerts