* [Blog](https://www.paloaltonetworks.com.au/blog) * [Palo Alto Networks](https://www.paloaltonetworks.com.au/blog/corporate) * Linux # Palo Alto Networks ## Linux [![Linux Threat Hunting with Cortex XDR](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2023/07/NetSec-Adhoc-Updated-Blog-Image-Resize-905545264.png)](https://www.paloaltonetworks.com.au/blog/security-operations/linux-threat-hunting-with-cortex-xdr/) [Linux Threat Hunting with Cortex XDR \------------------------------------](https://www.paloaltonetworks.com.au/blog/security-operations/linux-threat-hunting-with-cortex-xdr/) Take your Linux threat hunting skills to the next level with Cortex XDR and the MITRE ATT\&CK framework. Discover strategies and techniques to effectively hunt cyber threats in Linux environments. [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown) [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown) Jul 11, 2023 By [Raj Nepali](https://www.paloaltonetworks.com/blog/author/raj-nepali/?ts=markdown "Posts by Raj Nepali") ## Palo Alto Networks *** ** * ** *** [Announcements](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown) *** ** * ** *** [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown) *** ** * ** *** [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) *** ** * ** *** [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) *** ** * ** *** [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) *** ** * ** *** [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown) *** ** * ** *** ![How Cortex XDR Blocks Log4Shell Exploits with Java Deserialization Exploit Protection](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2021/12/Pen-Pointing-LI.jpg) [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [News and Events](https://www.paloaltonetworks.com/blog/security-operations/category/news-and-events/?ts=markdown) ## [How Cortex XDR Blocks Log4Shell Exploits with Java Deserialization Exploit ...](https://www.paloaltonetworks.com.au/blog/security-operations/how-cortex-xdr-blocks-log4shell-exploits-with-java-deserialization-exploit-protection/) Cortex XDR has blocked real attacks on Linux - learn how it does it Dec 21, 2021 By [Unit 42](https://www.paloaltonetworks.com/blog/author/unit-42/?ts=markdown "Posts by Unit 42") ![CVE-2021-26084 Linux Exploitation in the Wild](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2021/09/Coding-1.jpg) [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [News and Events](https://www.paloaltonetworks.com/blog/security-operations/category/news-and-events/?ts=markdown) ## [CVE-2021-26084 Linux Exploitation in the Wild](https://www.paloaltonetworks.com.au/blog/security-operations/cve-2021-26084-linux-exploitation-in-the-wild/) Attackers are actively exploiting CVE-2021-26084 Atlassian Confluence vulnerabilities in the wild. Read this blog to view the exact exploit attempts that were detected and blocked by Cortex XDR and learn how ma... Sep 24, 2021 By [Nadav Markus](https://www.paloaltonetworks.com/blog/author/nadav-markus/?ts=markdown "Posts by Nadav Markus") and [Abhishek Anbazhagan](https://www.paloaltonetworks.com/blog/author/abhishek-anbazhagan/?ts=markdown "Posts by Abhishek Anbazhagan") ![Xbash Combines Botnet, Ransomware, Coinmining in Worm that Targets Linux and Windows](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2018/04/unit42-blog-600x300.jpg) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Xbash Combines Botnet, Ransomware, Coinmining in Worm that Targets Linux an...](https://www.paloaltonetworks.com.au/blog/2018/09/unit42-xbash-combines-botnet-ransomware-coinmining-worm-targets-linux-windows/) Unit 42 researchers discover Xbash, a new malware family tied to the Iron Group targeting Linux and Microsoft Servers Sep 17, 2018 By [Claud Xiao](https://www.paloaltonetworks.com/blog/author/claud-xiao/?ts=markdown "Posts by Claud Xiao"), [Cong Zheng](https://www.paloaltonetworks.com/blog/author/cong-zheng/?ts=markdown "Posts by Cong Zheng") and [Xingyu Jin](https://www.paloaltonetworks.com/blog/author/xingyu-jin/?ts=markdown "Posts by Xingyu Jin") ![Multi-exploit IoT/Linux Botnets Mirai and Gafgyt Target Apache Struts, SonicWall](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2018/04/unit42-blog-600x300.jpg) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Multi-exploit IoT/Linux Botnets Mirai and Gafgyt Target Apache Struts, Soni...](https://www.paloaltonetworks.com.au/blog/2018/09/unit42-multi-exploit-iotlinux-botnets-mirai-gafgyt-target-apache-struts-sonicwall/) Unit 42 has uncovered new variants of the well-known IoT botnets Mirai and Gafgyt. Sep 09, 2018 By [Ruchna Nigam](https://www.paloaltonetworks.com/blog/author/ruchna-nigam/?ts=markdown "Posts by Ruchna Nigam") ![Unit 42 Finds New Mirai and Gafgyt IoT/Linux Botnet Campaigns](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2018/04/unit42-blog-600x300.jpg) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Unit 42 Finds New Mirai and Gafgyt IoT/Linux Botnet Campaigns](https://www.paloaltonetworks.com.au/blog/2018/07/unit42-finds-new-mirai-gafgyt-iotlinux-botnet-campaigns/) Unit 42 documents the emergence of three malware campaigns built on publicly available source code for the Mirai and Gafgyt malware families that incorporate multiple known exploit... Jul 20, 2018 By [Ruchna Nigam](https://www.paloaltonetworks.com/blog/author/ruchna-nigam/?ts=markdown "Posts by Ruchna Nigam") ![Threat Brief: Meltdown and Spectre Vulnerabilities](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2017/03/Linkedin.jpg) [Threat Brief](https://www.paloaltonetworks.com/blog/category/threat-brief/?ts=markdown) ## [Threat Brief: Meltdown and Spectre Vulnerabilities](https://www.paloaltonetworks.com.au/blog/2018/01/threat-brief-meltdown-spectre-vulnerabilities/) Get an overview of the Meltdown and Spectre vulnerabilities including a risk assessment and calls to action. Jan 04, 2018 By [Christopher Budd](https://www.paloaltonetworks.com/blog/author/christopher-budd/?ts=markdown "Posts by Christopher Budd") ![The Cybersecurity Canon: The Cathedral \& the Bazaar](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2017/06/cybersecuity-canon-blog-600x260.png) [Cybersecurity Canon](https://www.paloaltonetworks.com/blog/category/canon/?ts=markdown) ## [The Cybersecurity Canon: The Cathedral \& the Bazaar](https://www.paloaltonetworks.com.au/blog/2017/10/cybersecurity-canon-the-cathedral-bazaar/) Amy Butler and Hogan Lovells review "The Cathedral \& the Bazaar" for the Cybersecurity Canon. Oct 04, 2017 By [Amy Butler](https://www.paloaltonetworks.com/blog/author/amy-butler/?ts=markdown "Posts by Amy Butler") and [Hogan Lovells](https://www.paloaltonetworks.com/blog/author/hogan-lovells/?ts=markdown "Posts by Hogan Lovells") ![Palo Alto Networks News of the Week – April 8, 2017](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2016/11/blog-generic-banner-1.jpg) [News of the Week](https://www.paloaltonetworks.com/blog/category/news-of-the-week/?ts=markdown) ## [Palo Alto Networks News of the Week -- April 8, 2017](https://www.paloaltonetworks.com.au/blog/2017/04/palo-alto-networks-news-week-april-8-2017/) Did you miss any of this week's Palo Alto Networks action? Don't worry -- we've rounded up our top news and views right here. Apr 08, 2017 By [Justin Hall](https://www.paloaltonetworks.com/blog/author/justin-hall/?ts=markdown "Posts by Justin Hall") ![New IoT/Linux Malware Targets DVRs, Forms Botnet](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2016/09/unit42-web-banner-650x300.jpg) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [New IoT/Linux Malware Targets DVRs, Forms Botnet](https://www.paloaltonetworks.com.au/blog/2017/04/unit42-new-iotlinux-malware-targets-dvrs-forms-botnet/) Unit 42 researchers have identified a new variant of the IoT/Linux botnet "Tsunami", which we are calling "Amnesia". Apr 06, 2017 By [Claud Xiao](https://www.paloaltonetworks.com/blog/author/claud-xiao/?ts=markdown "Posts by Claud Xiao"), [Cong Zheng](https://www.paloaltonetworks.com/blog/author/cong-zheng/?ts=markdown "Posts by Cong Zheng") and [Yanhui Jia](https://www.paloaltonetworks.com/blog/author/yanui-jia/?ts=markdown "Posts by Yanhui Jia") ![License to Explore: Access the New Virtual Test Lab With Fuel User Group](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2016/12/FUEL_86081-16_VirtualTestLabs_WB2.png) [Fuel User Group](https://www.paloaltonetworks.com/blog/category/fuel-user-group/?ts=markdown) ## [License to Explore: Access the New Virtual Test Lab With Fuel User Group](https://www.paloaltonetworks.com.au/blog/2016/12/license-explore-access-new-virtual-test-lab-fuel-user-group/) Access to the Fuel Virtual Test Lab is one of several unique benefits available to Fuel User Group members. Join Fuel to access the Fuel Virtual Test Lab and the Palo Alto Networks... Dec 08, 2016 By [Megan Scofield](https://www.paloaltonetworks.com/blog/author/megan-scofield/?ts=markdown "Posts by Megan Scofield") [](https://www.paloaltonetworks.com.au/blog/2016/02/a-look-into-fysbis-sofacys-linux-backdoor/) [Malware](https://www.paloaltonetworks.com/blog/category/malware-2/?ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown), [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [A Look Into Fysbis: Sofacy's Linux Backdoor](https://www.paloaltonetworks.com.au/blog/2016/02/a-look-into-fysbis-sofacys-linux-backdoor/) The Sofacy group, also known as APT28 and Sednit, is a fairly well known cyber espionage group believed to have ties to Russia. Their targets have spanned all across the world, with a focus on government, defen... Feb 12, 2016 By [Bryan Lee](https://www.paloaltonetworks.com/blog/author/bryan-lee/?ts=markdown "Posts by Bryan Lee") and [Rob Downs](https://www.paloaltonetworks.com/blog/author/rob-downs/?ts=markdown "Posts by Rob Downs") [](https://www.paloaltonetworks.com.au/blog/2014/09/addressing-bash-vulnerability-shellshock-palo-alto-networks-mitigation-cve-2014-6271/) [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Threat Advisories - Advisories](https://www.paloaltonetworks.com/blog/category/threat-advisories-advisories/?ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown), [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Palo Alto Networks Addresses Bash Vulnerability Shellshock: Mitigation for ...](https://www.paloaltonetworks.com.au/blog/2014/09/addressing-bash-vulnerability-shellshock-palo-alto-networks-mitigation-cve-2014-6271/) Around 6:00 am PST on September 24, the details of a vulnerability in the widely used Bourne Again Shell (Bash) were disclosed by multiple Linux vendo... Sep 25, 2014 By [Ryan Olson](https://www.paloaltonetworks.com/blog/author/ryan-olson/?ts=markdown "Posts by Ryan Olson") [](https://www.paloaltonetworks.com.au/blog/2014/07/palo-alto-networks-news-week-july-18/) [Events](https://www.paloaltonetworks.com/blog/category/events/?ts=markdown), [News of the Week](https://www.paloaltonetworks.com/blog/category/news-of-the-week/?ts=markdown), [SCADA \& ICS](https://www.paloaltonetworks.com/blog/category/scada-ics/?ts=markdown), [Vertical](https://www.paloaltonetworks.com/blog/category/vertical/?ts=markdown) ## [Palo Alto Networks News of the Week -- July 18](https://www.paloaltonetworks.com.au/blog/2014/07/palo-alto-networks-news-week-july-18/) Here's a roundup of this week's top Palo Alto Networks news. Jul 18, 2014 By [Chad Berndtson](https://www.paloaltonetworks.com/blog/author/cberndston/?ts=markdown "Posts by Chad Berndtson") [](https://www.paloaltonetworks.com.au/blog/2014/07/iptables-backdoor-even-linux-risk-intrusion/) [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Malware](https://www.paloaltonetworks.com/blog/category/malware-2/?ts=markdown), [Threat Advisories - Advisories](https://www.paloaltonetworks.com/blog/category/threat-advisories-advisories/?ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown), [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Iptables Backdoor: Even Linux Is At Risk of Intrusion](https://www.paloaltonetworks.com.au/blog/2014/07/iptables-backdoor-even-linux-risk-intrusion/) A backdoor implant is an increasingly common mechanism for maintaining unauthorized access and control over a computer asset. The terms remote administration tool (RAT) and trojan... Jul 16, 2014 By [Jin Chen](https://www.paloaltonetworks.com/blog/author/jin-chen/?ts=markdown "Posts by Jin Chen") Load more blogs ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com.au/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language