Downhound(@downhounder) 's Twitter Profile Photo

Is Palo Alto Networks down?

status:

Prisma Cloud Compute service disruption. More: bit.ly/454ddOF

Seeing this? Please retweet. 🙏

Palo Alto Networks can you help?

Down 😱

Is Palo Alto Networks down?

#PaloAltoNetworks status:

Prisma Cloud Compute service disruption. More: bit.ly/454ddOF

Seeing this? Please retweet. 🙏

@PaloAltoNtwks can you help?

#PaloAltoNetworksDown 😱
account_circle
DZ(@Chicago_FM) 's Twitter Profile Photo

Things are moving fast at the booth Summit today.
Our cloud security experts are hwre and ready to rock your world! Swing by our booth, say hello, and let's chat all things security. See you there!

account_circle
Downhound(@downhounder) 's Twitter Profile Photo

Is Palo Alto Networks down?

status:

WildFire Global Cloud Issue. More: bit.ly/44N5V1f

Seeing this? Please retweet. 🙏

Palo Alto Networks can you help?

Down 😱

Is Palo Alto Networks down?

#PaloAltoNetworks status:

WildFire Global Cloud Issue. More: bit.ly/44N5V1f

Seeing this? Please retweet. 🙏

@PaloAltoNtwks can you help?

#PaloAltoNetworksDown 😱
account_circle
Downhound(@downhounder) 's Twitter Profile Photo

Is Palo Alto Networks down?

status:

Issue with onboarding new apps. More: bit.ly/4bC8Yvo

Seeing this? Please retweet. 🙏

Palo Alto Networks can you help?

Down 😱

Is Palo Alto Networks down?

#PaloAltoNetworks status:

Issue with onboarding new apps. More: bit.ly/4bC8Yvo

Seeing this? Please retweet. 🙏

@PaloAltoNtwks can you help?

#PaloAltoNetworksDown 😱
account_circle
CNBCOvertime(@CNBCOvertime) 's Twitter Profile Photo

“Cyber hacking activities are at an all-time high,“ says Palo Alto Networks Nikesh Arora.

He tells Jon Fortt how the expanded partnership between IBM & will use “AI to stop these threats in real time.”

$IBM $PANW

account_circle
Unit 42 Japan(@unit42_jp) 's Twitter Profile Photo

DNSトンネリングはC2やVPNのために使われるというイメージがありましたが、最近分析したキャンペーンから、被害者の行動追跡やネットワーク スキャンの手段にもこの技術が援用されていることわかってきました。4つの事例を例にあげて解説します。bit.ly/3WEKTjD

DNSトンネリングはC2やVPNのために使われるというイメージがありましたが、最近分析したキャンペーンから、被害者の行動追跡やネットワーク スキャンの手段にもこの技術が援用されていることわかってきました。4つの事例を例にあげて解説します。bit.ly/3WEKTjD
account_circle
Bipin Jitiya(@win3zz) 's Twitter Profile Photo

CVE-2024-3400: OS Command Injection Vulnerability in GlobalProtect Gateway

Severity: CRITICAL (10/10) ⚠️

Poc: github.com/DrewskyDev/CVE…

Other info:
unit42.paloaltonetworks.com/cve-2024-3400/
volexity.com/blog/2024/04/1…

CVE-2024-3400: OS Command Injection Vulnerability in GlobalProtect Gateway

Severity: CRITICAL (10/10) ⚠️

Poc: github.com/DrewskyDev/CVE…

Other info: 
unit42.paloaltonetworks.com/cve-2024-3400/
volexity.com/blog/2024/04/1…
account_circle
Unit 42(@Unit42_Intel) 's Twitter Profile Photo

Malicious redirection, logging victim activities, and more — a close analysis of how attackers use DNS tunneling for scanning and tracking in three observed campaigns exhibits how these understudied methods work. bit.ly/44EUiJJ

Malicious redirection, logging victim activities, and more — a close analysis of how attackers use DNS tunneling for scanning and tracking in three observed campaigns exhibits how these understudied methods work. bit.ly/44EUiJJ
account_circle
キタきつね(@foxbook) 's Twitter Profile Photo

パロアルトネットワークとIBMがサイバーセキュリティ戦略で連携

Palo Alto Networks and IBM Align Cybersecurity Strategies (May 16)


securityboulevard.com/2024/05/palo-a…

account_circle
Unit 42(@Unit42_Intel) 's Twitter Profile Photo

Microsoft OneNote files can be a versatile attack vector. This research on a unique topic walks analysts through the payload types, how images play into these attacks and an analysis of an embedded EXE payload. bit.ly/4buM6OM

Microsoft OneNote files can be a versatile attack vector. This research on a unique topic walks analysts through the payload types, how images play into these attacks and an analysis of an embedded EXE payload. bit.ly/4buM6OM
account_circle
🇺🇦Evan Kirstel #B2B #TechFluencer(@EvanKirstel) 's Twitter Profile Photo

🔒 Future-focused at : driving towards fully autonomous security, leveraging & advanced analytics to revolutionize . From ML-based prevention to autonomous operations.

account_circle
Prisma Cloud(@prisma_cloud) 's Twitter Profile Photo

AI security, like the broader AI ecosystem, is still evolving 📈

Learn how to protect your complete AI stack with Prisma® Cloud AI-SPM, designed to help organizations protect against the unique risks associated with AI, ML and GenAI models. bit.ly/3QEKLwz

AI security, like the broader AI ecosystem, is still evolving 📈 

Learn how to protect your complete AI stack with Prisma® Cloud AI-SPM, designed to help organizations protect against the unique risks associated with AI, ML and GenAI models. bit.ly/3QEKLwz
account_circle
EVOTEK(@EVOTEKhq) 's Twitter Profile Photo

A big shout-out to Palo Alto Networks with our Biggest Deal Award win! ' innovative next-generation cybersecurity platform empowers EVOTEK to deliver advanced threat protection to our clients.

A big shout-out to Palo Alto Networks with our Biggest Deal Award win! #PaloAltoNetworks' innovative next-generation cybersecurity platform empowers @EVOTEKhq to deliver advanced threat protection to our clients.
account_circle