Corporate Blogs

A Forrester nomeia a Palo Alto Networks como líder em XDR

A Forrester nomeia a Palo Alto Networks como líder em XDR

Desde que nosso fundador, Nir Zuk, cunhou pela primeira vez o termo “detecção e resposta estendida”, há quase seis anos, temos a missão de fazer do XDR a base das operações de segu...
Jul 10, 2024
Todas as camadas são criadas de formas diferentes

Todas as camadas são criadas de formas diferentes

Todos sabem que, para um artigo de jornal, publicação em blog ou artigo técnico ter credibilidade, o autor dev...
Aug 22, 2019
Como ajudar os analistas do SOC a lutarem contra a

Como ajudar os analistas do SOC a lutarem contra a "fadiga de alertas"

Além da prevenção inicial, a maioria das ferramentas de segurança são desenvolvidas para r...
Aug 20, 2019
O Cortex XDR e o Traps superaram seu desempenho na Avaliação MITRE

O Cortex XDR e o Traps superaram seu desempenho na Avaliação MITRE

Temos o prazer de divulgar os resultados de um teste independente que demonstram o valor d...
Aug 19, 2019

Network Security Blogs

Testando os limites de desempenho e flexibilidade do firewall

Testando os limites de desempenho e flexibilidade do firewall

5 novas plataformas de firewall ampliam o portfólio de hardware da Palo Alto para novos casos de uso
Jan 18, 2024

Unit 42 Threat Research

company article

Gleaming Pisces Poisoned Python Packages Campaign Delivers PondRA...

We track a campaign by Gleaming Pisces (Citrine Sleet) delivering Linux or macOS backdoors via Python packages, aiming to infiltrate supply chain vendors....
September 18, 2024
company article

Phishing Pages Delivered Through Refresh HTTP Response Header

We detail a rare phishing mechanism using a refresh entry in the HTTP response header for stealth redirects to malicious pages, affecting finance and government...
September 11, 2024
company article

Threat Assessment: Repellent Scorpius, Distributors of Cicada3301...

Repellent Scorpius distributes Cicada3301 ransomware, using double extortion and targeting global victims since May 2024. We break down their toolset and more....
September 10, 2024
company article

Threat Assessment: North Korean Threat Groups

Explore Unit 42's review of North Korean APT groups and their impact, detailing the top 10 malware and tools we've seen from these threat actors....
September 9, 2024
By  Unit 42
company article

Chinese APT Abuses VSCode to Target Government in Asia

A first in our telemetry: Chinese APT Stately Taurus uses Visual Studio Code to maintain a reverse shell in victims' environments for Southeast Asian espionage....
September 6, 2024
company article

Spoofed GlobalProtect Used to Deliver Unique WikiLoader Variant

Unit 42 discusses WikiLoader malware spoofing GlobalProtect VPN, detailing evasion techniques, malicious URLs, and mitigation strategies....
September 2, 2024
company article

TLD Tracker: Exploring Newly Released Top-Level Domains

Unit 42 researchers use a novel graph-based pipeline to detect misuse of 19 new TLDs for phishing, chatbots and more in several case studies....
August 30, 2024
company article

The Emerging Dynamics of Deepfake Scam Campaigns on the Web

A technical analysis of deepfake technology uncovers how cybercriminals utilize AI-generated videos of public figures to execute sophisticated scams....

Subscribe to the Newsletter!

Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.