Home Search
Palo Alto Networks - search results
If you're not happy with the results, please do another search
APT Actors Exploit Multiple Legacy Vulnerabilities to Target SLTT and Govt. Networks
The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI claimed that cybercriminals obtained unauthorized access to government networks by exploiting multiple legacy vulnerabilities...
95% IT Pros are Confident About the Visibility of IoT Devices on Their Networks
The proliferation of the Internet of Things (IoT) devices in consumer, enterprise, and health care organizations, and their internal vulnerabilities has created a security...
Vulnerabilities in PAN-OS Could Compromise Internal Networks
Security researchers Mikhail Klyuchnikov and Nikita Abramov from Positive Technologies uncovered four severe vulnerabilities in Palo Alto Networks’ PAN-OS, a software that runs on...
CISA Adds 15 New Flaws to its Actively Exploited Vulnerabilities Catalog
Unresolved security issues serve as frequent attack vectors for opportunistic cybercriminals. It is known that threat actors often target publicly known or unpatched security...
Microsoft Disrupts Chinese Threat Actor Group Nickel
Microsoft announced that it had disrupted the operations of a Chinese cyberespionage group targeting organizations in the U.S. and 28 other countries. Tracked as...
Unleashing the Full Power of AI and ML for Your Cybersecurity
The growth of data and the increasing complexity of extracting intelligence from information have led businesses and governments across the globe to implement artificial...
Securing ‘Digital India’ With a Zero Trust Approach
What are some of the biggest challenges facing countries across the globe today? Technology is transforming human societies and communities across the globe, in...
Chinese Cyber Espionage Campaign Found Exploiting Zoho Vulnerability
Critical infrastructure and technology vendors become a frequent target for state-sponsored adversaries. A security research team from Palo Alto Networks’ Unit 42 uncovered an...
Creator of Zero-Trust Model Says Trust Did Not Exist in a Digital World
It seems no security conference or conversation is complete without a discussion on zero trust. But not long ago, “trust” was only a human...
Overcoming the Challenges of Executing a Remote Security Policy
Gartner estimates that around 30% of workers in India will be remote in 2022. While the penetration might be low compared to the U.S.,...