* [Blog](https://www.paloaltonetworks.com.au/blog) * [Palo Alto Networks](https://www.paloaltonetworks.com.au/blog/corporate) * Android # Palo Alto Networks ## Android [![Hidden Devil in the Development Life Cycle: Google Play Apps Infected with Windows Executable Files](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2018/04/unit42-blog-600x300.jpg)](https://www.paloaltonetworks.com.au/blog/2018/07/unit42-hidden-devil-development-life-cycle-google-play-apps-infected-windows-executable-files/) [Hidden Devil in the Development Life Cycle: Google Play Apps Infected with Windows Executable Files \---------------------------------------------------------------------------------------------------](https://www.paloaltonetworks.com.au/blog/2018/07/unit42-hidden-devil-development-life-cycle-google-play-apps-infected-windows-executable-files/) Unit 42 uncovers 145 malicious Google Play apps. Get the full report. [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) Jul 30, 2018 By [Yue Chen](https://www.paloaltonetworks.com/blog/author/yue-chen/?ts=markdown "Posts by Yue Chen"), [Wenjun Hu](https://www.paloaltonetworks.com/blog/author/wenjun-hu/?ts=markdown "Posts by Wenjun Hu"), [Xiao Zhang](https://www.paloaltonetworks.com/blog/author/xiao/?ts=markdown "Posts by Xiao Zhang") and [Zhi Xu](https://www.paloaltonetworks.com/blog/author/zhi-xu/?ts=markdown "Posts by Zhi Xu") ## Palo Alto Networks *** ** * ** *** [Announcements](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown) *** ** * ** *** [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown) *** ** * ** *** [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) *** ** * ** *** [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) *** ** * ** *** [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) *** ** * ** *** [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown) *** ** * ** *** ![News of the Week: June 16, 2018](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2017/09/Linkedin-520x320-v1-1.png) [News of the Week](https://www.paloaltonetworks.com/blog/category/news-of-the-week/?ts=markdown) ## [News of the Week: June 16, 2018](https://www.paloaltonetworks.com.au/blog/2018/06/news-week-june-16-2018/) Catch up on the latest Palo Alto Networks news of the week. Jun 16, 2018 By [Justin Hall](https://www.paloaltonetworks.com/blog/author/justin-hall/?ts=markdown "Posts by Justin Hall") ![Introducing Traps for Android](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2018/06/android_2_blog.png) [Endpoint](https://www.paloaltonetworks.com/blog/category/endpoint-2/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown) ## [Introducing Traps for Android](https://www.paloaltonetworks.com.au/blog/2018/06/introducing-traps-android/) Introducing Traps for Android: detection and prevention to Android endpoints. Jun 14, 2018 By [Danny Milrad](https://www.paloaltonetworks.com/blog/author/danny-milrad/?ts=markdown "Posts by Danny Milrad") ![HenBox: Inside the Coop](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2018/04/unit42-blog-600x300.jpg) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [HenBox: Inside the Coop](https://www.paloaltonetworks.com.au/blog/2018/04/unit42-henbox-inside-coop/) Unit 42 goes inside the coop with new analysis and additional information on malicious HenBox applications Apr 26, 2018 By [Alex Hinchliffe](https://www.paloaltonetworks.com/blog/author/alex-hinchliffe/?ts=markdown "Posts by Alex Hinchliffe"), [Mike Harbison](https://www.paloaltonetworks.com/blog/author/mike-harbison/?ts=markdown "Posts by Mike Harbison"), [Jen Miller-Osborn](https://www.paloaltonetworks.com/blog/author/jen-miller-osborn/?ts=markdown "Posts by Jen Miller-Osborn") and [Tom Lancaster](https://www.paloaltonetworks.com/blog/author/tom-lancaster/?ts=markdown "Posts by Tom Lancaster") ![Reaper Group’s Updated Mobile Arsenal](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2016/09/unit42-web-banner-650x300.jpg) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Reaper Group's Updated Mobile Arsenal](https://www.paloaltonetworks.com.au/blog/2018/04/unit42-reaper-groups-updated-mobile-arsenal/) Unit 42 examines the Reaper Group's updated mobile arsenal, including a Bitcoin Ticker Widget and a PyeongChang Winter Games application. Apr 05, 2018 By [Ruchna Nigam](https://www.paloaltonetworks.com/blog/author/ruchna-nigam/?ts=markdown "Posts by Ruchna Nigam") ![TeleRAT: Another Android Trojan Leveraging Telegram’s Bot API to Target Iranian Users](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2016/09/unit42-web-banner-650x300.jpg) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [TeleRAT: Another Android Trojan Leveraging Telegram's Bot API to Target Ira...](https://www.paloaltonetworks.com.au/blog/2018/03/unit42-telerat-another-android-trojan-leveraging-telegrams-bot-api-to-target-iranian-users/) Unit 42 discovers TeleRAT, an Android Trojan abusing Telegram's Bot API for command and control and data exfiltration. Mar 20, 2018 By [Ruchna Nigam](https://www.paloaltonetworks.com/blog/author/ruchna-nigam/?ts=markdown "Posts by Ruchna Nigam") and [Kyle Wilhoit](https://www.paloaltonetworks.com/blog/author/kyle-wilhoit/?ts=markdown "Posts by Kyle Wilhoit") ![HenBox: The Chickens Come Home to Roost](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2016/09/unit42-web-banner-650x300.jpg) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [HenBox: The Chickens Come Home to Roost](https://www.paloaltonetworks.com.au/blog/2018/03/unit42-henbox-chickens-come-home-roost/) Unit 42 discovers HenBox, an Android Malware family masquerading as legitimate apps on third-party app stores. Mar 13, 2018 By [Alex Hinchliffe](https://www.paloaltonetworks.com/blog/author/alex-hinchliffe/?ts=markdown "Posts by Alex Hinchliffe"), [Mike Harbison](https://www.paloaltonetworks.com/blog/author/mike-harbison/?ts=markdown "Posts by Mike Harbison"), [Jen Miller-Osborn](https://www.paloaltonetworks.com/blog/author/jen-miller-osborn/?ts=markdown "Posts by Jen Miller-Osborn") and [Tom Lancaster](https://www.paloaltonetworks.com/blog/author/tom-lancaster/?ts=markdown "Posts by Tom Lancaster") ![Palo Alto Networks News of the Week: February 10, 2018](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2017/09/Linkedin-520x320-v1-1.png) [News of the Week](https://www.paloaltonetworks.com/blog/category/news-of-the-week/?ts=markdown) ## [Palo Alto Networks News of the Week: February 10, 2018](https://www.paloaltonetworks.com.au/blog/2018/02/palo-alto-networks-news-of-the-week-february-10-2018/) Catch up on all the latest Palo Alto Networks news. Feb 10, 2018 By [Justin Hall](https://www.paloaltonetworks.com/blog/author/justin-hall/?ts=markdown "Posts by Justin Hall") ![Mobile Android Is an Even Bigger Opportunity for Attackers Than Windows PCs](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2017/05/blog-service-providers-banner-650x300.png) [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Service Providers](https://www.paloaltonetworks.com/blog/category/service-providers/?ts=markdown) ## [Mobile Android Is an Even Bigger Opportunity for Attackers Than Windows PCs](https://www.paloaltonetworks.com.au/blog/2018/02/sp-mobile-android-even-bigger-opportunity-attackers-windows-pcs/) Mobile Android is now a bigger threat opportunity than Windows PCs. What mobile network operators need to know about the current mobile threat landsca... Feb 07, 2018 By [Terry Young](https://www.paloaltonetworks.com/blog/author/terry-young/?ts=markdown "Posts by Terry Young") ![Threat Brief: Meltdown and Spectre Vulnerabilities](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2017/03/Linkedin.jpg) [Threat Brief](https://www.paloaltonetworks.com/blog/category/threat-brief/?ts=markdown) ## [Threat Brief: Meltdown and Spectre Vulnerabilities](https://www.paloaltonetworks.com.au/blog/2018/01/threat-brief-meltdown-spectre-vulnerabilities/) Get an overview of the Meltdown and Spectre vulnerabilities including a risk assessment and calls to action. Jan 04, 2018 By [Christopher Budd](https://www.paloaltonetworks.com/blog/author/christopher-budd/?ts=markdown "Posts by Christopher Budd") ![2 Minute Threat Brief: Android Toast Overlay Attack](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2017/03/Linkedin.jpg) [Threat Brief](https://www.paloaltonetworks.com/blog/category/threat-brief/?ts=markdown) ## [2 Minute Threat Brief: Android Toast Overlay Attack](https://www.paloaltonetworks.com.au/blog/2017/09/unit42-2-minute-threat-brief-android-toast-overlay-attack/) 2 Minute Threat Brief: Android Toast Overlay Attack. Sep 14, 2017 By [Eila Shargh](https://www.paloaltonetworks.com/blog/author/eila-shargh/?ts=markdown "Posts by Eila Shargh") ![Threat Brief: Patch Today and Don’t Get Burned by an Android Toast Overlay](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2017/03/Linkedin.jpg) [Threat Brief](https://www.paloaltonetworks.com/blog/category/threat-brief/?ts=markdown), [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Threat Brief: Patch Today and Don't Get Burned by an Android Toast Overlay](https://www.paloaltonetworks.com.au/blog/2017/09/unit42-threat-brief-patch-today-dont-get-burned-android-toast-overlay-attack/) Palo Alto Networks Unit 42 researchers share details of a new high severity vulnerability affecting the Google Android platform. Sep 07, 2017 By [Christopher Budd](https://www.paloaltonetworks.com/blog/author/christopher-budd/?ts=markdown "Posts by Christopher Budd") ![Android Toast Overlay Attack: “Cloak and Dagger” with No Permissions](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2016/09/unit42-web-banner-650x300.jpg) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Android Toast Overlay Attack: "Cloak and Dagger" with No Permissions](https://www.paloaltonetworks.com.au/blog/2017/09/unit42-android-toast-overlay-attack-cloak-and-dagger-with-no-permissions/) Palo Alto Networks Unit 42 researchers have uncovered a high severity vulnerability in the Android overlay system, which allows a new Android overlay attack by using the "Toast typ... Sep 07, 2017 By [Cong Zheng](https://www.paloaltonetworks.com/blog/author/cong-zheng/?ts=markdown "Posts by Cong Zheng"), [Wenjun Hu](https://www.paloaltonetworks.com/blog/author/wenjun-hu/?ts=markdown "Posts by Wenjun Hu"), [Xiao Zhang](https://www.paloaltonetworks.com/blog/author/xiao/?ts=markdown "Posts by Xiao Zhang") and [Zhi Xu](https://www.paloaltonetworks.com/blog/author/zhi-xu/?ts=markdown "Posts by Zhi Xu") ![Palo Alto Networks News of the Week – July 8, 2017](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2015/10/blog-generic-banner.jpg) [News of the Week](https://www.paloaltonetworks.com/blog/category/news-of-the-week/?ts=markdown) ## [Palo Alto Networks News of the Week -- July 8, 2017](https://www.paloaltonetworks.com.au/blog/2017/07/palo-alto-networks-news-week-july-8-2017/) Catch up on the top Palo Alto Networks news of the week. Jul 08, 2017 By [Justin Hall](https://www.paloaltonetworks.com/blog/author/justin-hall/?ts=markdown "Posts by Justin Hall") ![SpyDealer: Android Trojan Spying on More Than 40 Apps](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2016/09/unit42-web-banner-650x300.jpg) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [SpyDealer: Android Trojan Spying on More Than 40 Apps](https://www.paloaltonetworks.com.au/blog/2017/07/unit42-spydealer-android-trojan-spying-40-apps/) Palo Alto Networks researchers discovered an advanced Android malware we've named "SpyDealer" which exfiltrates private data from more than 40 apps and steals sensitive messages from communication apps by abusi... Jul 06, 2017 By [Wenjun Hu](https://www.paloaltonetworks.com/blog/author/wenjun-hu/?ts=markdown "Posts by Wenjun Hu"), [Cong Zheng](https://www.paloaltonetworks.com/blog/author/cong-zheng/?ts=markdown "Posts by Cong Zheng") and [Zhi Xu](https://www.paloaltonetworks.com/blog/author/zhi-xu/?ts=markdown "Posts by Zhi Xu") ![Ewind – Adware in Applications’ Clothing](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2016/09/unit42-web-banner-650x300.jpg) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Ewind -- Adware in Applications' Clothing](https://www.paloaltonetworks.com.au/blog/2017/04/unit42-ewind-adware-applications-clothing/) Threat actors use popular android applications to mask Ewind adware. Apr 11, 2017 By [Yaron Samuel](https://www.paloaltonetworks.com/blog/author/yaron-samuel/?ts=markdown "Posts by Yaron Samuel") and [Simon Conant](https://www.paloaltonetworks.com/blog/author/simon-conant/?ts=markdown "Posts by Simon Conant") ![Targeted Attacks in the Middle East Using KASPERAGENT and MICROPSIA](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2016/09/unit42-web-banner-650x300.jpg) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Targeted Attacks in the Middle East Using KASPERAGENT and MICROPSIA](https://www.paloaltonetworks.com.au/blog/2017/04/unit42-targeted-attacks-middle-east-using-kasperagent-micropsia/) This post explores how the attackers attempt to gain a foothold into target networks before briefly describing the malware families used. Apr 05, 2017 By [Tomer Bar](https://www.paloaltonetworks.com/blog/author/tomer-bar/?ts=markdown "Posts by Tomer Bar") and [Tom Lancaster](https://www.paloaltonetworks.com/blog/author/tom-lancaster/?ts=markdown "Posts by Tom Lancaster") ![Google Play Apps Infected with Malicious IFrames](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2016/09/unit42-web-banner-650x300.jpg) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Google Play Apps Infected with Malicious IFrames](https://www.paloaltonetworks.com.au/blog/2017/03/unit42-google-play-apps-infected-malicious-iframes/) Unit 42 researchers discover Google Play apps infected with malicious IFrames. Mar 01, 2017 By [Xiao Zhang](https://www.paloaltonetworks.com/blog/author/xiao/?ts=markdown "Posts by Xiao Zhang"), [Wenjun Hu](https://www.paloaltonetworks.com/blog/author/wenjun-hu/?ts=markdown "Posts by Wenjun Hu") and [Shawn Jin](https://www.paloaltonetworks.com/blog/author/shawn-jin/?ts=markdown "Posts by Shawn Jin") ![PluginPhantom: New Android Trojan Abuses “DroidPlugin” Framework](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2016/09/unit42-web-banner-650x300.jpg) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [PluginPhantom: New Android Trojan Abuses "DroidPlugin" Framework](https://www.paloaltonetworks.com.au/blog/2016/11/unit42-pluginphantom-new-android-trojan-abuses-droidplugin-framework/) Recently, we discovered a new Google Android Trojan named "PluginPhantom", which steals many types of user information including: files, location data, contacts and Wi-Fi informati... Nov 30, 2016 By [Cong Zheng](https://www.paloaltonetworks.com/blog/author/cong-zheng/?ts=markdown "Posts by Cong Zheng") and [Tongbo Luo](https://www.paloaltonetworks.com/blog/author/tongbo-luo/?ts=markdown "Posts by Tongbo Luo") [](https://www.paloaltonetworks.com.au/blog/2016/09/dualtoy-new-windows-trojan-sideloads-risky-apps-to-android-and-ios-devices/) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [DualToy: New Windows Trojan Sideloads Risky Apps to Android and iOS Devices](https://www.paloaltonetworks.com.au/blog/2016/09/dualtoy-new-windows-trojan-sideloads-risky-apps-to-android-and-ios-devices/) Over the past two years, we've observed many cases of Microsoft Windows and Apple iOS malware designed to attack mobile devices. This attack vector is increasingly popular with mal... Sep 13, 2016 By [Claud Xiao](https://www.paloaltonetworks.com/blog/author/claud-xiao/?ts=markdown "Posts by Claud Xiao") [](https://www.paloaltonetworks.com.au/blog/2016/07/palo-alto-networks-news-of-the-week-july-30-2016/) [Events](https://www.paloaltonetworks.com/blog/category/events/?ts=markdown), [News of the Week](https://www.paloaltonetworks.com/blog/category/news-of-the-week/?ts=markdown) ## [Palo Alto Networks News of the Week -- July 30, 2016](https://www.paloaltonetworks.com.au/blog/2016/07/palo-alto-networks-news-of-the-week-july-30-2016/) Unit 42 had a busy week! Researchers Robert Falcone and Jen Miller-Osborn observed a 9002 Trojan delivered using a combination of shortened links and a shared file hosted on Google Drive. Jul 30, 2016 By [Anna Lough](https://www.paloaltonetworks.com/blog/author/anna-lough/?ts=markdown "Posts by Anna Lough") Load more blogs Load more blogs ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com.au/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language