<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Beyond the Breach: Strategies Against Ivanti Vulnerabilities in Threat Vector</title>
    <link>https://live.paloaltonetworks.com/t5/threat-vector/beyond-the-breach-strategies-against-ivanti-vulnerabilities/ta-p/582696</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat-Vector_Beyond-the-Breach-Strategies-Against-Ivanti-Vulnerabilities_palo-alto-networks.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/58837iAFB913222CEFE387/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Threat-Vector_Beyond-the-Breach-Strategies-Against-Ivanti-Vulnerabilities_palo-alto-networks.jpg" alt="Threat-Vector_Beyond-the-Breach-Strategies-Against-Ivanti-Vulnerabilities_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;2/5/24:&lt;/STRONG&gt; In this episode of &lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;Threat Vector&lt;/STRONG&gt;&lt;/FONT&gt;, host David Moulton, &lt;EM&gt;Director of Thought Leadership&lt;/EM&gt; at Unit 42, along with guests Sam Rubin, &lt;EM&gt;VP, Global Head of Operations&lt;/EM&gt;, and Ingrid Parker, &lt;EM&gt;Senior Manager of the Intel Response Unit&lt;/EM&gt;, dive deep into the critical vulnerabilities found in Ivanti's Connect Secure and Policy Secure products.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;They explore the vulnerabilities' potential impact, the urgency of mitigation, and strategies for defense. This discussion sheds light on the tactical and strategic responses necessitated by the current threat landscape, highlighting the collaboration between public directives and private sector response.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;They also discuss what Palo Alto Networks is doing to help the cybersecurity community at this time with a no-cost, no-obligation emergency bundle.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Learn about the no-cost, no-obligation emergency bundle at &lt;A href="https://www.paloaltonetworks.com/Ivanti-VPN-exploit-response" target="_blank"&gt;https://www.paloaltonetworks.com/Ivanti-VPN-exploit-response&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For the latest insights and research on the Ivanti vulnerabilities, visit the Unit 42 Threat Research Center at &lt;A href="https://unit42.paloaltonetworks.com/threat-brief-ivanti-cve-2023-46805-cve-2024-21887/" target="_blank"&gt;https://unit42.paloaltonetworks.com/threat-brief-ivanti-cve-2023-46805-cve-2024-21887/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you believe you are at risk because of an Ivanti Vulnerability, Palo Alto Networks is offering a no-cost, no-obligation emergency bundle for your organization.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Join the conversation on our social media channels: &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Website: ⁠⁠⁠⁠&lt;A href="https://www.paloaltonetworks.com/unit42⁠" target="_blank" rel="noopener"&gt;https://www.paloaltonetworks.com/unit42⁠&lt;/A&gt;⁠⁠⁠ &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Threat Research: ⁠⁠⁠⁠&lt;A href="https://unit42.paloaltonetworks.com/⁠" target="_blank" rel="noopener"&gt;https://unit42.paloaltonetworks.com/⁠&lt;/A&gt;⁠⁠⁠ &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Facebook: ⁠⁠⁠⁠&lt;A href="https://www.facebook.com/LifeatPaloAltoNetworks/⁠" target="_blank" rel="noopener"&gt;https://www.facebook.com/LifeatPaloAltoNetworks/⁠&lt;/A&gt;⁠⁠⁠ &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;LinkedIn: ⁠⁠⁠⁠&lt;A href="https://www.linkedin.com/company/unit42/⁠" target="_blank" rel="noopener"&gt;https://www.linkedin.com/company/unit42/⁠&lt;/A&gt;⁠⁠⁠ &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;YouTube: ⁠⁠⁠⁠@PaloAltoNetworksUnit42⁠⁠⁠⁠ &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Twitter: ⁠⁠⁠⁠&lt;A href="https://twitter.com/PaloAltoNtwks⁠" target="_blank" rel="noopener"&gt;https://twitter.com/PaloAltoNtwks⁠&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;IFRAME src="https://playlist.megaphone.fm/?e=CYBW7473450221" width="100%" height="200" frameborder="0" scrolling="no"&gt;&lt;/IFRAME&gt;&lt;/DIV&gt;</description>
    <pubDate>Thu, 04 Apr 2024 18:51:22 GMT</pubDate>
    <dc:creator>dmoulton</dc:creator>
    <dc:date>2024-04-04T18:51:22Z</dc:date>
    <item>
      <title>Beyond the Breach: Strategies Against Ivanti Vulnerabilities</title>
      <link>https://live.paloaltonetworks.com/t5/threat-vector/beyond-the-breach-strategies-against-ivanti-vulnerabilities/ta-p/582696</link>
      <description>&lt;P&gt;In this episode of &lt;STRONG&gt;Threat Vector&lt;/STRONG&gt;, host David Moulton, &lt;EM&gt;Director of Thought Leadership&lt;/EM&gt; at Unit 42, along with guests Sam Rubin, &lt;EM&gt;VP, Global Head of Operations&lt;/EM&gt;, and Ingrid Parker, &lt;EM&gt;Senior Manager of the Intel Response Unit&lt;/EM&gt;, dive deep into the critical vulnerabilities found in Ivanti's Connect Secure and Policy Secure products.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat-Vector_Beyond-the-Breach-Strategies-Against-Ivanti-Vulnerabilities_palo-alto-networks.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/58839i04BFABBE3B791A1E/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Threat-Vector_Beyond-the-Breach-Strategies-Against-Ivanti-Vulnerabilities_palo-alto-networks.jpg" alt="Threat-Vector_Beyond-the-Breach-Strategies-Against-Ivanti-Vulnerabilities_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2024 18:51:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/threat-vector/beyond-the-breach-strategies-against-ivanti-vulnerabilities/ta-p/582696</guid>
      <dc:creator>dmoulton</dc:creator>
      <dc:date>2024-04-04T18:51:22Z</dc:date>
    </item>
  </channel>
</rss>

