Home Search

Palo Alto Networks - search results

If you're not happy with the results, please do another search
Cyber Espionage Campaign Naikon APT

APT Actors Exploit Multiple Legacy Vulnerabilities to Target SLTT and Govt. Networks

The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI claimed that cybercriminals obtained unauthorized access to government networks by exploiting multiple legacy vulnerabilities...
Number of IoT Devices Expected to Reach 24.1 Bn in 2030: Report

95% IT Pros are Confident About the Visibility of IoT Devices on Their Networks

The proliferation of the Internet of Things (IoT) devices in consumer, enterprise, and health care organizations, and their internal vulnerabilities has created a security...

Vulnerabilities in PAN-OS Could Compromise Internal Networks

Security researchers Mikhail Klyuchnikov and Nikita Abramov from Positive Technologies uncovered four severe vulnerabilities in Palo Alto Networks’ PAN-OS, a software that runs on...
CISA vulnerabilities, Microsoft Vulnerabilities, HP Device Manager Susceptible to Dictionary Attacks

CISA Adds 15 New Flaws to its Actively Exploited Vulnerabilities Catalog

Unresolved security issues serve as frequent attack vectors for opportunistic cybercriminals. It is known that threat actors often target publicly known or unpatched security...
Nickel, Hackers, Twitch source code

Microsoft Disrupts Chinese Threat Actor Group Nickel

Microsoft announced that it had disrupted the operations of a Chinese cyberespionage group targeting organizations in the U.S. and 28 other countries. Tracked as...
Artificial Intelligence, AL and ML

Unleashing the Full Power of AI and ML for Your Cybersecurity

The growth of data and the increasing complexity of extracting intelligence from information have led businesses and governments across the globe to implement artificial...
User Verification Policy, zero trust approach

Securing ‘Digital India’ With a Zero Trust Approach

What are some of the biggest challenges facing countries across the globe today? Technology is transforming human societies and communities across the globe, in...
Zoho Vulnerability , Atlassian Confluence Vulnerability

Chinese Cyber Espionage Campaign Found Exploiting Zoho Vulnerability

Critical infrastructure and technology vendors become a frequent target for state-sponsored adversaries. A security research team from Palo Alto Networks’ Unit 42 uncovered an...

Creator of Zero-Trust Model Says Trust Did Not Exist in a Digital World

It seems no security conference or conversation is complete without a discussion on zero trust. But not long ago, “trust” was only a human...
Remote Security Policy, Remote Work Jeopardizes Corporate Network Security: Report

Overcoming the Challenges of Executing a Remote Security Policy

Gartner estimates that around 30% of workers in India will be remote in 2022. While the penetration might be low compared to the U.S.,...



Tampa Cybersecurity Conference

Tampa Cybersecurity Conference


Global Cyber Security Summit

Global Cyber Security Summit