Leveraging Rubrik in Cortex XSOARRubrik and Cortex XSOAR are excited to share that the new Rubrik Polaris content pack and integration is now available w...
Shining a Light on Log4j Exploit PayloadsCortex XDR Managed Threat Hunting deep-dive into rarely seen payloads attackers have attempted to execute using the Log4...
Discover how ransomware attacks go beyond ransom payments, impacting your company's bottom line through recovery costs, lost revenue and damaged trust.
There is a ransomware speed crisis. Attacks have accelerated 100x faster since 2021. Discover why traditional security fails and build AI-powered defenses.
Protect your SaaS agents with Prisma AIRS as part of Security Webhooks in Microsoft Copilot Studio for real-time runtime protection and posture security.
Security blind spots are a key risk. Learn how a unified multicloud security fabric provides complete, real-time asset mapping to secure your entire estate.
Secure organizations' web edge with Prisma Browser for Essential Eight and ISM compliance. Palo Alto Networks fortifies applications against cyber threats.
Identity has become the new battleground. In a world where work happens everywhere and applications live in the cloud, passwords, passwordless authentication, and even MFA can no l...
Modern AppSec demands context. Cortex Cloud and Semgrep integrate to unify code, runtime, and infrastructure visibility, helping teams prioritize expl...
Application security posture management (ASPM) turns scans into context, prioritizes risk, and embeds guidance in developer workflows to prevent produ...
Deploy Cortex XSIAM in 3 months or less with AI-powered migration tools. Replace your SIEM faster with automated onboarding and ready-to-use analytics.
Unit 42 explores the escalating threat of AI-powered malicious SEO and its impact on the credibility of the open web. Read more about how threat actors are expl...
Unit 42 discusses the misuse of pentesting tool AzureHound by threat actors for cloud discovery. Learn how to detect this activity through telemetry....
Global smishing activity tracked by Unit 42 includes impersonation of many critical services. Its unique ecosystem allows attackers to quickly scale....
Threat actors behind the gift card fraud campaign Jingle Thief target retail via phishing and smishing, maintaining long-term access in cloud environments....
A nation-state actor stole BIG-IP source code and information on undisclosed vulnerabilities from F5. We explain what sets this theft apart from others....
Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.
Get the latest news, invites to events, and threat alerts
Get the latest news, invites to events, and threat alerts