- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Welcome to our June 2025 Rewind, where we review some of LIVEcommunity’s popular headlines from the past month!
In June, we showcased content on the latest Always Innovating in NetSec series, Unit 42’s May Threat Bulletin, and expert tips for BGP troubleshooting and App-ID debugging. We explored how IoT Security integrates into Strata Cloud Manager, new advances in DNS tunneling detection, and why non-human identities matter now more than ever. Plus, we shared updates from the Fuel User Group, new YouTube videos, and the latest Threat Vector podcast episodes. Dive in to see all of June 2025’s top highlights!
Always Innovating in NetSec Series: May 2025
Our Always Innovating in NetSec blog series continues, this month, we’re showcasing how Palo Alto Networks continues to lead the charge—from launching a new Palo Alto Networks TV series that brings our Cloud-Delivered Security Services (CDSS) to life, to earning top marks in independent third-party evaluations. We’re also tackling emerging threats, such as unauthorized AI bots in virtual meetings, and unveiling new capabilities, like ADEM for NGFW, that elevate the user experience across hybrid environments. Explore more in our blog…
Unit 42 Threat Bulletin - May 2025
Welcome to our May Threat Bulletin! We’ve worked hard this past month curating key articles and valuable resources that we think you'll find incredibly useful for staying ahead in cybersecurity. Catch up now…
Support FAQ: How to Troubleshoot BGP on Palo Alto Networks Firewalls
Most days, BGP runs quietly in the background. BGP advertises routes that keep your WAN, VPN, cloud environments, and public services connected and reachable. Until it doesn’t. And when BGP breaks, it’s not just a routing issue, it’s unreachable services and frustrated users. This guide will help you troubleshoot BGP on Palo Alto Networks firewalls, so you can quickly identify the problem and get traffic flowing again. Read more…
Support FAQ: Flood Attacks - Configuration & Troubleshooting Best Practices
This guide is designed to help firewall admins effectively understand flood attack prevention and troubleshoot flooding incidents detected by Palo Alto Networks firewalls. Whether the event is triggered by packet buffer protection (PBP), Zone Protection (ZPP), or DoS protection profiles (DoSP), this document provides guidance on how to identify the type of flood, determine the root cause, and take corrective & preventive actions through “Best Practices”. Click on the link to read more…
Tips & Tricks: App-ID Debugging
This article is inspired from Tips & Tricks: Flow Basic Debugging written by @kiwi and I recommend reading that article first before reading this one. Find out more in our article…
Streamlined Security: IoT Security is Fully Integrated into Strata Cloud Manager
Big news for your enterprise security posture: Palo Alto Networks IoT Security is fully integrated into Strata Cloud Manager – accelerating IoT/OT security outcomes with AI-powered, fully integrated into network security workflows. Read more in our blog…
DNS, the backbone of the internet, helps translate human-readable domain names into IP addresses. While essential, its permissive nature in many networks also makes it an attractive channel for attackers to exfiltrate sensitive data or establish covert command-and-control (C2) communication—a technique known as DNS tunneling. Click on the link to read more…
The MCP Wake-Up Call: Why Non-Human Identities Must Be on Your Radar
“I didn’t know we were using it.” That’s what many security teams say after a data exposure. The recent incident at Asana involving its Model Context Protocol (MCP) server is a perfect example of how non-human identities—like OAuth Apps, bots, integrations, and service accounts—can silently introduce security risks without detection or oversight. Read more in our blog…
Attackers are constantly evolving—making today’s cyber threats more elusive than ever. Among the most difficult to detect is highly evasive, malleable Command and Control (C2) traffic.
This stealthy communication stems from compromised systems trying to "phone home" to external C2 servers. Red-team tools, such as Cobalt Strike and Empire, created for penetration testing, are designed with features that generate customizable traffic profiles, allowing malicious activity to blend in with legitimate network traffic and bypass traditional security defenses. Click on the link to read more…
Unlock Your Quantum Defense – Introducing the Quantum Readiness View on SCM Pro
The digital world is on the cusp of a new era – the quantum age. While this leap forward promises unprecedented advancements, it also presents a formidable threat to our current cybersecurity infrastructure. The cryptographic standards that protect our sensitive data today will be rendered obsolete by the power of quantum computers. Read more in our blog…
Fuel Workshop: GlobalProtect From a Palo Alto Networks Perspective
The Fuel Workshop team hosted a four-day GlobalProtect event on June 23, June 24, July 1, and July 2, 2025. We're pleased to announce that recordings for Days 1 and 2 are already available on this page. Recordings for Days 3 and 4 will be added as soon as they are complete. Find out more in our blog…
New Fuel User Group Webinar Series: Fuel Technical Alliance
We're thrilled to introduce the Fuel Technical Alliance (FTA), a brand-new webinar series designed to bring valuable insights and offerings directly to Fuel members. This series will feature Palo Alto Networks partners, VARs (Value-Added Resellers), and other technical resources, offering diverse perspectives and solutions. Read our blog to learn more!
Fuel Technical Alliance: Smarter Security Policy Management Across NGFW, Prisma Access & XSOAR
On June 18, 2025, Fuel had its inaugural Fuel Technical Alliance (FTA) webinar, a new virtual event series hosted by Palo Alto Networks partners and technical alliance vendors, with the goal of making Fuel members aware of valuable offerings they may not be aware of. Watch the recording of the June 18 Fuel Technical Alliance webinar, all about how smart security policies across your firewalls, cloud, and edge network access empower your operations.
Embracing Your Role: Palo Alto Networks Certifications Get a Makeover
Heads up, cybersecurity pros! Palo Alto Networks is shaking things up big time with their certifications. They're moving away from "product-specific" exams and diving into a role-based framework. This is awesome because it means your certs will align with the real-world job you do every day! Read more…
Threat Vector is your compass in the world of cyberthreats. We unravel cyber threat intelligence secrets through engaging discussions, expert interviews, and insightful analysis. Hear our unique threat intelligence, cutting-edge techniques, and real-world case studies. We'll equip you with the knowledge and insight to proactively prepare and stay ahead in the ever-evolving threat landscape.
Be sure to subscribe to our Monthly Rewinds to stay up-to-date on LIVEcommunity news, updates, and more!
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Subject | Likes |
---|---|
5 Likes | |
4 Likes | |
3 Likes | |
3 Likes | |
3 Likes |
User | Likes Count |
---|---|
11 | |
5 | |
4 | |
4 | |
3 |