* [Blog](https://www.paloaltonetworks.com.au/blog) * [Palo Alto Networks](https://www.paloaltonetworks.com.au/blog/corporate) * threat research # Palo Alto Networks ## threat research [![NL2XQL: Turning Natural Language into Powerful Cybersecurity Querying](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2025/04/Explaining.jpg)](https://www.paloaltonetworks.com.au/blog/security-operations/nl2xql-turning-natural-language-into-powerful-cybersecurity-querying/) [NL2XQL: Turning Natural Language into Powerful Cybersecurity Querying \---------------------------------------------------------------------](https://www.paloaltonetworks.com.au/blog/security-operations/nl2xql-turning-natural-language-into-powerful-cybersecurity-querying/) NL2XQL transforms natural language into powerful XQL queries, making cybersecurity investigations accessible to all security teams without requiring deep syntax knowledge. [AI and Cybersecurity](https://www.paloaltonetworks.com/blog/security-operations/category/ai-and-cybersecurity/?ts=markdown) [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown) [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown) [Use-Cases](https://www.paloaltonetworks.com/blog/security-operations/category/use-cases/?ts=markdown) Apr 23, 2025 By [Gal Itzhak](https://www.paloaltonetworks.com/blog/author/gal-itzhak/?ts=markdown "Posts by Gal Itzhak") and [Lior Perry](https://www.paloaltonetworks.com/blog/author/lior-perry/?ts=markdown "Posts by Lior Perry") ## Palo Alto Networks *** ** * ** *** [Announcements](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown) *** ** * ** *** [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown) *** ** * ** *** [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) *** ** * ** *** [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) *** ** * ** *** [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) *** ** * ** *** [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown) *** ** * ** *** ![2023 Unit 42 Attack Surface Threat Report Highlights the Need for ASM](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2023/09/Pen-Pointing-1.jpg) [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [2023 Unit 42 Attack Surface Threat Report Highlights the Need for ASM](https://www.paloaltonetworks.com.au/blog/2023/09/attack-surface-threat-report-highlights-need-for-asm/) The 2023 Unit 42 Attack Surface Threat Report highlights the need for attack surface management capabilities. Sep 14, 2023 By [Matt Kraning](https://www.paloaltonetworks.com/blog/author/matt-kraning/?ts=markdown "Posts by Matt Kraning") ![Cybersecurity Insights: Upcoming Events with the Threat Research Team](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2023/09/Brainstorm-1.jpg) [Events](https://www.paloaltonetworks.com/blog/category/events/?ts=markdown), [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [News and Events](https://www.paloaltonetworks.com/blog/security-operations/category/news-and-events/?ts=markdown) ## [Cybersecurity Insights: Upcoming Events with the Threat Research Team](https://www.paloaltonetworks.com.au/blog/security-operations/cybersecurity-insights-upcoming-events-with-the-threat-research-team/) Join Palo Alto Networks' Threat Research Team at upcoming global events. Learn about espionage campaigns, web hosting threats, and APTs. Sep 13, 2023 By [Dena De Angelo](https://www.paloaltonetworks.com/blog/author/ddeangelo/?ts=markdown "Posts by Dena De Angelo") ![Mitigate Cloud Breaches With a Holistic Approach to Cloud Identity and Access](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2023/06/Hi-Tech-Work.jpg) [CIEM](https://www.paloaltonetworks.com/blog/cloud-security/category/ciem/?ts=markdown) ## [Mitigate Cloud Breaches With a Holistic Approach to Cloud Identity and Acce...](https://www.paloaltonetworks.com.au/blog/cloud-security/defense-in-depth-cloud-identity-security/) Take a defense in depth approach to protect your cloud identities, credentials and secrets, and secure your cloud environment from breaches. Jul 03, 2023 By [John Chavanne](https://www.paloaltonetworks.com/blog/author/john-chavanne/?ts=markdown "Posts by John Chavanne") ![Containers, Assemble: What Cloud Threat Actors Don’t Want You to Know](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2022/06/Collaborate-2.jpg) [Cloud Infrastructure Entitlement Management](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-infrastructure-entitlement-management/?ts=markdown), [Cloud Native Application Platform](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-native-application-platform/?ts=markdown), [Cloud Workload Protection Platform](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-workload-protection-platform/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) ## [Containers, Assemble: What Cloud Threat Actors Don't Want You to Know](https://www.paloaltonetworks.com.au/blog/2022/06/cloud-threat-actors/) Cloud Threat Actors target cloud environments -- learn how your organization can combine cl... Jun 06, 2022 By [Aimee Savran](https://www.paloaltonetworks.com/blog/author/asavran/?ts=markdown "Posts by Aimee Savran") ![WAAS-Up with Cryptojacking Microservice-Based Web Apps?](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2021/05/Pen-Pointing.jpg) [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [Cloud Workload Protection Platform](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-workload-protection-platform/?ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown) ## [WAAS-Up with Cryptojacking Microservice-Based Web Apps?](https://www.paloaltonetworks.com.au/blog/cloud-security/waas-cryptojacking-microservice-based-web-apps/) Exploring a malicious attempt at cryptojacking a microservice-based web app, and contrasting a few ways Prisma Cloud could have thwarted it. Jun 03, 2021 By [Scott McAndrew](https://www.paloaltonetworks.com/blog/author/scott-mcandrew/?ts=markdown "Posts by Scott McAndrew") ![Cortex XDR Blocks Undiscovered UAC Bypasses](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2020/05/Hunter.png) [News and Events](https://www.paloaltonetworks.com/blog/security-operations/category/news-and-events/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown) ## [Cortex XDR Blocks Undiscovered UAC Bypasses](https://www.paloaltonetworks.com.au/blog/security-operations/cortex-xdr-blocks-undiscovered-uac-bypasses/) Cortex XDR researchers recently found new UAC (User Account Control) bypasses on a fully patched Windows 10. While the method used is not new, the abused binaries that can be used with that method were previous... Oct 15, 2020 By [Or Chechik](https://www.paloaltonetworks.com/blog/author/or-chechik/?ts=markdown "Posts by Or Chechik") ![Announcing Cortex XDR Managed Threat Hunting – Community Edition and New XDR Features](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2020/02/image1-1.png) [Secure the Future](https://www.paloaltonetworks.com/blog/category/secure-the-future/?ts=markdown) ## [Announcing Cortex XDR Managed Threat Hunting -- Community Edition and New XD...](https://www.paloaltonetworks.com.au/blog/2020/02/cortex-managed-threat-hunting/) The Community Access edition of Cortex XDR Managed Threat Hunting is a powerful threat hunting service exclusively for our Cortex XDR customers. Feb 06, 2020 By [Mitchell Bezzina](https://www.paloaltonetworks.com/blog/author/mitchell-bezzina/?ts=markdown "Posts by Mitchell Bezzina") ![Unit 42 Named Top Zero-Day Vulnerability Contributor by Microsoft](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2019/08/Picture-1.png) [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown) ## [Unit 42 Named Top Zero-Day Vulnerability Contributor by Microsoft](https://www.paloaltonetworks.com.au/blog/2019/08/unit-42-named-top-zero-day-vulnerability-contributor-microsoft/) Palo Alto Networks is proud that Microsoft has recognized our Unit 42 global threat intelligence team with multiple awards for its contributions to vulnerability research, includin... Aug 16, 2019 By [John Harrison](https://www.paloaltonetworks.com/blog/author/john-harrison/?ts=markdown "Posts by John Harrison") ![OilRig Data Analysis Shows Breadth of Hacking Campaign](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2018/04/unit42-blog-600x300.jpg) [Threat Research](https://www.paloaltonetworks.com/blog/category/threat-research/?ts=markdown) ## [OilRig Data Analysis Shows Breadth of Hacking Campaign](https://www.paloaltonetworks.com.au/blog/2019/04/oilrig-data-analysis-shows-breadth-hacking-campaign/) Palo Alto Networks Unit 42 threat research team has determined that the OilRig hacking group's activities are more widespread than previously understood, compromising at least 97 organizations in 27 countries, ... Apr 30, 2019 By [Unit 42](https://www.paloaltonetworks.com/blog/author/unit-42/?ts=markdown "Posts by Unit 42") ![EMEA Bi-Monthly Threat Reports: Turkey, Saudi Arabia \& United Arab Emirates](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2016/09/unit42-web-banner-650x300.jpg) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [EMEA Bi-Monthly Threat Reports: Turkey, Saudi Arabia \& United Arab Emi...](https://www.paloaltonetworks.com.au/blog/2017/07/unit42-emea-bi-monthly-threat-reports-turkey-saudi-arabia-united-arab-emirates/) Unit 42's EMEA bi-monthly threat report. Jul 10, 2017 By [Alex Hinchliffe](https://www.paloaltonetworks.com/blog/author/alex-hinchliffe/?ts=markdown "Posts by Alex Hinchliffe") ![EMEA Bi-Monthly Threat Reports: United Kingdom, Germany \& France](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2016/09/unit42-web-banner-650x300.jpg) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [EMEA Bi-Monthly Threat Reports: United Kingdom, Germany \& France](https://www.paloaltonetworks.com.au/blog/2017/06/unit42-emea-bi-monthly-threat-reports-united-kingdom-germany-france/) Alex Hinchliffe of Unit 42 examines recent threats targeting the EMEA region. Jun 09, 2017 By [Alex Hinchliffe](https://www.paloaltonetworks.com/blog/author/alex-hinchliffe/?ts=markdown "Posts by Alex Hinchliffe") ![A New Trend in Android Adware: Abusing Android Plugin Frameworks](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2016/09/unit42-web-banner-650x300.jpg) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [A New Trend in Android Adware: Abusing Android Plugin Frameworks](https://www.paloaltonetworks.com.au/blog/2017/03/unit42-new-trend-android-adware-abusing-android-plugin-frameworks/) Unit 42 researchers uncover aggressive adware abusing third-party DroidPlugin framework on Android. Mar 22, 2017 By [Cong Zheng](https://www.paloaltonetworks.com/blog/author/cong-zheng/?ts=markdown "Posts by Cong Zheng"), [Wenjun Hu](https://www.paloaltonetworks.com/blog/author/wenjun-hu/?ts=markdown "Posts by Wenjun Hu") and [Zhi Xu](https://www.paloaltonetworks.com/blog/author/zhi-xu/?ts=markdown "Posts by Zhi Xu") ![Targeted Ransomware Attacks Middle Eastern Government Organizations for Political Purposes](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2016/09/unit42-web-banner-650x300.jpg) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Targeted Ransomware Attacks Middle Eastern Government Organizations for Pol...](https://www.paloaltonetworks.com.au/blog/2017/03/unit42-targeted-ransomware-attacks-middle-eastern-government-organizations-political-purposes/) New research from Palo Alto Networks Unit 42: Targeted ransomware attacks Middle Eastern governments for political purposes. Mar 08, 2017 By [Robert Falcone](https://www.paloaltonetworks.com/blog/author/robert-falcone/?ts=markdown "Posts by Robert Falcone") and [Josh Grunzweig](https://www.paloaltonetworks.com/blog/author/josh-grunzweig/?ts=markdown "Posts by Josh Grunzweig") ![Google Play Apps Infected with Malicious IFrames](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2016/09/unit42-web-banner-650x300.jpg) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Google Play Apps Infected with Malicious IFrames](https://www.paloaltonetworks.com.au/blog/2017/03/unit42-google-play-apps-infected-malicious-iframes/) Unit 42 researchers discover Google Play apps infected with malicious IFrames. Mar 01, 2017 By [Xiao Zhang](https://www.paloaltonetworks.com/blog/author/xiao/?ts=markdown "Posts by Xiao Zhang"), [Wenjun Hu](https://www.paloaltonetworks.com/blog/author/wenjun-hu/?ts=markdown "Posts by Wenjun Hu") and [Shawn Jin](https://www.paloaltonetworks.com/blog/author/shawn-jin/?ts=markdown "Posts by Shawn Jin") ![The Gamaredon Group Toolset Evolution](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2016/09/unit42-web-banner-650x300.jpg) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [The Gamaredon Group Toolset Evolution](https://www.paloaltonetworks.com.au/blog/2017/02/unit-42-title-gamaredon-group-toolset-evolution/) Unit 42 threat researchers have recently observed a threat group distributing new, custom developed malware. We have labelled this threat group the Gamaredon Group and our research shows that the Gamaredon Group has been active since at least 2013. Feb 27, 2017 By [Anthony Kasza](https://www.paloaltonetworks.com/blog/author/anthony-kasza/?ts=markdown "Posts by Anthony Kasza") and [Dominik Reichel](https://www.paloaltonetworks.com/blog/author/dominik-reichel/?ts=markdown "Posts by Dominik Reichel") ![Downeks and Quasar RAT Used in Recent Targeted Attacks Against Governments](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2016/09/unit42-web-banner-650x300.jpg) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Downeks and Quasar RAT Used in Recent Targeted Attacks Against Governments](https://www.paloaltonetworks.com.au/blog/2017/01/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/) Downeks and Quasar RAT used in recent targeted attacks against governments. Get the full report from Unit 42. Jan 30, 2017 By [Mashav Sapir](https://www.paloaltonetworks.com/blog/author/mashav-sapir/?ts=markdown "Posts by Mashav Sapir"), [Tomer Bar](https://www.paloaltonetworks.com/blog/author/tomer-bar/?ts=markdown "Posts by Tomer Bar"), [Netanel Rimer](https://www.paloaltonetworks.com/blog/author/netanel-rimer/?ts=markdown "Posts by Netanel Rimer"), [Taras Malivanchuk](https://www.paloaltonetworks.com/blog/author/taras-malivanchuk/?ts=markdown "Posts by Taras Malivanchuk"), [Yaron Samuel](https://www.paloaltonetworks.com/blog/author/yaron-samuel/?ts=markdown "Posts by Yaron Samuel") and [Simon Conant](https://www.paloaltonetworks.com/blog/author/simon-conant/?ts=markdown "Posts by Simon Conant") ![Threat Brief: Shamoon 2 Wave 3 Attacks](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2017/01/650x300_Blog.jpeg) [Threat Brief](https://www.paloaltonetworks.com/blog/category/threat-brief/?ts=markdown), [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Threat Brief: Shamoon 2 Wave 3 Attacks](https://www.paloaltonetworks.com.au/blog/2017/01/unit42-threat-brief-shamoon-2-wave-3-attacks/) Read the new Unit 42 Threat Brief for the latest update on Shamoon 2. Jan 30, 2017 By [Christopher Budd](https://www.paloaltonetworks.com/blog/author/christopher-budd/?ts=markdown "Posts by Christopher Budd") ![Farming Malicious Documents to Unravel Ransomware](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2016/09/unit42-web-banner-650x300.jpg) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Farming Malicious Documents to Unravel Ransomware](https://www.paloaltonetworks.com.au/blog/2017/01/unit42-farming-malicious-documents-unravel-ransomware/) Unit 42 researcher analyzes new threat technique in this blog post on the farming of malicious documents to unravel ransomware. Jan 27, 2017 By [Jeff White](https://www.paloaltonetworks.com/blog/author/jeff-white/?ts=markdown "Posts by Jeff White") ![Exploring the Cybercrime Underground: Part 3 – Into the RAT Nest](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2016/09/unit42-web-banner-650x300.jpg) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Exploring the Cybercrime Underground: Part 3 -- Into the RAT Nest](https://www.paloaltonetworks.com.au/blog/2017/01/unit42-exploring-cybercrime-underground-part-3-rat-nest/) In this third part of Unit 42's Cybercrime Underground blog series, we're taking a slightly different approach. In this blog we begin with data from a real attack in the wild, and... Jan 26, 2017 By [Simon Conant](https://www.paloaltonetworks.com/blog/author/simon-conant/?ts=markdown "Posts by Simon Conant") ![2016 Updates to Shifu Banking Trojan](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2016/09/unit42-web-banner-650x300.jpg) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [2016 Updates to Shifu Banking Trojan](https://www.paloaltonetworks.com.au/blog/2017/01/unit42-2016-updates-shifu-banking-trojan/) Shifu is a Banking Trojan first discovered in 2015. Shifu is based on the Shiz source code which incorporated techniques used by Zeus. Attackers use Shifu to steal credentials for online banking websites around the world, starting in Russia but later including the UK, I... Jan 06, 2017 By [Dominik Reichel](https://www.paloaltonetworks.com/blog/author/dominik-reichel/?ts=markdown "Posts by Dominik Reichel") Load more blogs Load more blogs ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com.au/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language