<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CVE Mapping for Zero-day Exploits: Enhancement in Threat content release notes and Cloud reports in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-mapping-for-zero-day-exploits-enhancement-in-threat-content/m-p/1218236#M2406</link>
    <description>&lt;P&gt;&lt;STRONG&gt;Advanced Threat Prevention&lt;/STRONG&gt;&lt;SPAN&gt;&lt;STRONG&gt;&amp;nbsp;(ATP)&lt;/STRONG&gt; is industry's first IPS to stop Zero-day attacks inline. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ATP is powered by &lt;STRONG&gt;Precision AI&lt;/STRONG&gt;, a proprietary system that leverages the capability of Machine Learning, Deep Learning, and Generative AI. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;These security models are trained with high-fidelity data to accurately detect and prevent rapidly evolving threats in real-time.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In order to bring greater &lt;STRONG&gt;clarity and transparency&lt;/STRONG&gt;, we recently introduced CVE Mapping to enhance our threat content release notes and Cloud report as follows:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;1.)&amp;nbsp;The &lt;STRONG&gt;threat content release note&lt;/STRONG&gt;&amp;nbsp;includes a new section for CVEs detected by ATP's inline cloud detection models, for Command Injection &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;and SQL Injection, when a new zero-day exploit is detected.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-01-30 103833.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/65561i9BD20D621935F934/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot 2025-01-30 103833.png" alt="Screenshot 2025-01-30 103833.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;2.) The ATP's &lt;STRONG&gt;Cloud report&lt;/STRONG&gt; includes CVEs mapped&amp;nbsp;to the unknown zero-day exploits reported by inline cloud detection models of advanced threat prevention.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt; With CVE Mapping enhancement, the Cloud report now provides detailed CVE information as follows:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL id="id0c5928cf-31f6-4b98-8c9e-f7ffeb816e15_ul-szn_mjx_c2c" class="ul"&gt;
&lt;LI class="li"&gt;
&lt;DIV class="p"&gt;CVE ID&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;DIV class="p"&gt;Name of the CVE.&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;DIV class="p"&gt;Description of the CVE.&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;DIV class="p"&gt;Category of CVE, e.g. SQL injection or Command injection&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;DIV class="p"&gt;Severity level, e.g.&amp;nbsp;Critical, High, Medium, or Low&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;DIV class="p"&gt;Score as determined by the CVSS (range 0 -10)&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;DIV class="p"&gt;First Published Date of CVE&amp;nbsp;&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;DIV class="p"&gt;Confidence Level - the degree of certainty our&amp;nbsp;&lt;SPAN&gt;ML models have for the CVE mapping&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;To learn more please watch this &lt;A href="https://youtu.be/ABBQhfrD_ho" target="_blank" rel="noopener"&gt;video with live demo&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt; &lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;#Advanced Threat Prevention #Cloud Delivered Security Services #Network Security&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 30 Jan 2025 19:00:42 GMT</pubDate>
    <dc:creator>kvarshney</dc:creator>
    <dc:date>2025-01-30T19:00:42Z</dc:date>
    <item>
      <title>CVE Mapping for Zero-day Exploits: Enhancement in Threat content release notes and Cloud reports</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-mapping-for-zero-day-exploits-enhancement-in-threat-content/m-p/1218236#M2406</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Advanced Threat Prevention&lt;/STRONG&gt;&lt;SPAN&gt;&lt;STRONG&gt;&amp;nbsp;(ATP)&lt;/STRONG&gt; is industry's first IPS to stop Zero-day attacks inline. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ATP is powered by &lt;STRONG&gt;Precision AI&lt;/STRONG&gt;, a proprietary system that leverages the capability of Machine Learning, Deep Learning, and Generative AI. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;These security models are trained with high-fidelity data to accurately detect and prevent rapidly evolving threats in real-time.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In order to bring greater &lt;STRONG&gt;clarity and transparency&lt;/STRONG&gt;, we recently introduced CVE Mapping to enhance our threat content release notes and Cloud report as follows:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;1.)&amp;nbsp;The &lt;STRONG&gt;threat content release note&lt;/STRONG&gt;&amp;nbsp;includes a new section for CVEs detected by ATP's inline cloud detection models, for Command Injection &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;and SQL Injection, when a new zero-day exploit is detected.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-01-30 103833.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/65561i9BD20D621935F934/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot 2025-01-30 103833.png" alt="Screenshot 2025-01-30 103833.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;2.) The ATP's &lt;STRONG&gt;Cloud report&lt;/STRONG&gt; includes CVEs mapped&amp;nbsp;to the unknown zero-day exploits reported by inline cloud detection models of advanced threat prevention.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt; With CVE Mapping enhancement, the Cloud report now provides detailed CVE information as follows:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL id="id0c5928cf-31f6-4b98-8c9e-f7ffeb816e15_ul-szn_mjx_c2c" class="ul"&gt;
&lt;LI class="li"&gt;
&lt;DIV class="p"&gt;CVE ID&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;DIV class="p"&gt;Name of the CVE.&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;DIV class="p"&gt;Description of the CVE.&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;DIV class="p"&gt;Category of CVE, e.g. SQL injection or Command injection&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;DIV class="p"&gt;Severity level, e.g.&amp;nbsp;Critical, High, Medium, or Low&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;DIV class="p"&gt;Score as determined by the CVSS (range 0 -10)&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;DIV class="p"&gt;First Published Date of CVE&amp;nbsp;&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;DIV class="p"&gt;Confidence Level - the degree of certainty our&amp;nbsp;&lt;SPAN&gt;ML models have for the CVE mapping&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;To learn more please watch this &lt;A href="https://youtu.be/ABBQhfrD_ho" target="_blank" rel="noopener"&gt;video with live demo&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt; &lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;#Advanced Threat Prevention #Cloud Delivered Security Services #Network Security&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jan 2025 19:00:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-mapping-for-zero-day-exploits-enhancement-in-threat-content/m-p/1218236#M2406</guid>
      <dc:creator>kvarshney</dc:creator>
      <dc:date>2025-01-30T19:00:42Z</dc:date>
    </item>
  </channel>
</rss>

