Threat & Vulnerability
This forum provides information regarding how to detect and prevent the impact of vulnerabilities, malware, and other threats through the use of the Palo Alto Networks security platform.
515 PostsThis forum provides information regarding how to detect and prevent the impact of vulnerabilities, malware, and other threats through the use of the Palo Alto Networks security platform.
515 PostsTraps Advanced Endpoint Protection prevents cyber breaches by protecting and enabling users to conduct their daily activities, and automating prevention by autonomously reprogramming itself using threat intelligence gained from WildFire.
20 PostsA forum to ask or share about Data Loss Prevention (DLP) strategy. DLP ensures sensitive or confidential information doesn't leak outside of the corporate network. Let's rethink DPL together.
13 PostsThis forum is to discuss Palo Alto Networks' Next-Generation CASB, an integrated, multi-faceted CASB solution that helps security teams meet the security challenges of today.
14 PostsDiscussions about IoT Security — aka the Internet of Things — a cybersecurity strategy that safeguards against the possibility of cyberattacks which specifically target physical IoT devices that are connected to the network.
25 PostsWelcome to the AI Access Security discussion area! Here, we focus on how AI Access Security facilitates safe Generative AI adoption by providing real-time visibility, streamlined access control, and robust data protection. Join us to share insights and discuss strategies for keeping sensitive information secure in AI applications.
3 Posts
Microsoft Windows Shortcut Font Name Overflow Vulnerability
Hi Team,
Kindly clarify me why we need web-security policy while even we having same feature in normal prisma access policy?
Scenario,
SaaS security discovered several apps, we can create a policy and later import to websecurity by policy recommend
...
To make this forum valuable and enjoyable for everyone, please review the following guidelines before participating:
To make this forum valuable and enjoyable for everyone, please review the following guidelines before participating:
To make this forum valuable and enjoyable for everyone, please review the following guidelines before participating:
To make this forum valuable and enjoyable for everyone, please review the following guidelines before participating:
To make this forum valuable and enjoyable for everyone, please review the following guidelines before participating:
Threat Prevention goes beyond a typical intrusion prevention system (IPS) to inspect all traffic for threats (regardless of port, protocol, or encryption), and automatically blocks known vulnerabilities, malware, exploits, spyware, and command-and-co
...
Can anyone share any technical insight into what the attack payload might be or you may be observing in your Threat logs?
We have found some malformed DNS packet sent to port 53 that the FW labels as MS Windows NAT Helper DNS Query DoS Vulnerability
I looking for the log file that tracks the IP addresses of devices that have connected to our Palo Alto Networks firewall.
I am interested in any logs that show source and destination IP addresses for network connections.
Could you please point me to
...
It is suggested to upgrade to version 10.2.12-h2 to remediate the vulnerability. However, the firmware version 10.2.12-h2 is currently in monitoring status. It is also mentioned that the same fix is available in version 10.2.10-h9, which is the prefe
...
Hello
I'm Tomoyuki Nakamura.
Are there any plans to release signature for the vulnerabilities below?.
These were not listed in THREAT VAULT or Security Advisory.
CVE-2024-8932
CVE-2024-11236
Best Regards,
Tomoyuki Nakamura
In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodul
...
Hi I would like to enquire if any Palo Alto products are affected by the above vulnerability.
Thanks.
In Prisma cloud how do i track base images. that is the know who is using the defined base images and who is not using them. like can i get a list of all containers leveraging the defined base images?
Subject | Likes |
---|---|
1 Like Likes |