Government organisations and critical infrastructure entities are the custodians of some of the most important and sensitive data in the world. This data and the systems that they process underpin some of the most fundamental functions in modern society, from the provision of food, water, power to the management of welfare, fina...
Government organisations and critical infrastructure entities are the custodians of some of the most important and sensitive data in the world. This data and the systems that they process underpin some of the most fundamental functions in m...
A comprehensive, adaptive and insightful view into prompt attacks against GenAI systems, a framework for defending against emerging threats in AI security.
Palo Alto Networks helps U.S. Federal agencies and vendors protect against cyberthreats with FedRAMP High Authorization for network, cloud, and SecOps.
AI Bot Detection and Control is available in AI Access Security & SaaS Security Posture Management to detect & control AI bots in collaboration meetings.
Learn how our latest CDSS innovations help business leaders shift from reactive firefighting to proactive control in new Palo Alto Networks TV series....
ADEM expands trusted visibility and remediation capabilities from Prisma SASE to NGFW, empowering IT teams for unified network control and performance...
AI Bot Detection and Control is available in AI Access Security & SaaS Security Posture Management to detect & control AI bots in collaboration meetings.
Palo Alto Networks and Google Cloud offer a unified platform for secure user and application connectivity, enhancing security posture and reducing costs.
Cortex Cloud helps security teams prepare for AI-powered IDEs in the wake of OpenAI’s Windsurf acquisition, securing code and risks across the lifecyc...
Cloud identity security depends on more than IAM hygiene. Learn how attackers exploit data access paths—and how to stop them with unified security int...
Cloud workload protection (CWP) gains new power with Cortex Cloud—unifying data, correlating context, and enabling CloudSec teams to respond with precision.
Can CSPs offer effective cloud security when using a competitor’s cloud infrastructure or is it wise to adopt cloud-agnostic security across your multicloud estate?
Modern cloud threats require real-time protection to stop attacks in progress, correlate threats across the application stack and enable rapid, automa...
Prisma Cloud becomes Cortex Cloud: Our CNAPP story of innovation, defining and transforming cloud security for the duration of CNAPP’s five-year marke...
Discover cutting-edge advancements in security ops with the latest Cortex releases. New features enhance threat prevention, platform coverage, automation, and attack surface tests for streamlined and robust sec...
XSIAM is expanding from reactive response to proactive defense, transforming exposure management and email security with unified data, AI and automation.
We detail the observed limited activity regarding authentication bypass vulnerability CVE-2024-0012 affecting specific versions of PAN-OS software, and include ...
CVE-2025-31324 impacts SAP NetWeaver's Visual Composer Framework. We share our observations on this vulnerability using incident response cases and telemetry....
Unit 42 details a new malware obfuscation technique where threat actors hide malware in bitmap resources within .NET applications. These deliver payloads like A...
A suspected Iranian espionage campaign impersonated a model agency site for data collection, including fictitious models as possible social engineering lures. ...
Programs leveraging AI agents are increasingly popular. Nine attack scenarios using open-source agent frameworks show how bad actors target these applications....
Ransomware leak site data and Unit 42 case studies reveal new trends from Q1 2025, including the most active groups, targeted industries and novel extortion tac...
Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.
Get the latest news, invites to events, and threat alerts