March 2025 Rewind: LIVEcommunity Highlights

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Community Blogs
6 min read
Community Team Member

March-2025-Rewind_palo-alto-networks.jpg

 

 

Welcome to our March 2025 Rewind, where we review some of LIVEcommunity’s biggest headlines from the past month!

 

In March, we featured articles and blogs on: a new Quantum Security page, the release of a new Support FAQ article, Threat Vector’s latest podcast episodes, changes to our member ranks, the latest Product-centric blogs, and a lot more! Read on to see the community's March 2025 highlights. 

 

Community Highlights

 

Exciting Announcement: Introducing the New Quantum Security Page!

We are thrilled to announce the launch of our brand-new Quantum Security page! This dedicated space is designed to provide you with all the essential information, updates, and resources related to our cutting-edge Quantum Security solutions. Whether you're a security professional, IT leader, or a cybersecurity enthusiast, this page is your go-to resource for everything Quantum Security.

 

Hackers Evolve. So Did We – Inside Ignite London 2025!

Ignite on Tour London 2025: Last week, Palo Alto Networks rolled into Magazine London for Ignite on Tour 2025, and honestly, it had a bit of everything — big ideas, real talk, hands-on labs, and a ton of sharp people swapping notes on what’s actually working in cybersecurity right now. Learn more in our blog…

 

Support FAQ: A Guide to NAT on Palo Alto Networks Firewalls (KW)

If you’ve ever worked with network security, you’ve probably encountered Network Address Translation (NAT) at some point. It’s one of those fundamental networking concepts that keeps the internet running smoothly. But why should you use NAT specifically on Palo Alto Networks ‘firewalls? Let’s break it down in a way that makes sense, especially if you're managing security policies and network architecture. Learn more in our article…

 

Upcoming Changes to LIVEcommunity Member Ranks

The Community Team is excited to announce that we will soon be rolling out a new ranking system on LIVEcommunity! Ranks are a meaningful gamification element that reward participation, showcase contributions, and encourage engagement within our community! Ranks affect all members, as each of us—newcomers and veterans alike—are automatically assigned a rank based on our community activity. Learn more about it in our blog…

 

 

Product Insights

 

Unmasking the Threat: How Palo Alto Networks Detects Deepfake Phishing and Scams

Attackers are using deepfake technology to create convincing phishing scams by impersonating trusted individuals, such as CEOs, colleagues, and celebrities. With AI-powered lip-syncing, face-swapping, and voice cloning, they trick victims into clicking malicious links or revealing sensitive information. These scams are harder to detect because they use realistic video and audio, not just fake emails or static images. Traditional phishing detection methods don’t analyze multimedia content, making it easier for attackers to deceive people. Learn more in our blog…

 

Healthcare Monitors at Risk Beyond a Backdoor

The Cybersecurity and Infrastructure Security Agency (CISA) detected an apparent backdoor in the firmware of the Contec CMS8000, a device used to monitor patient vital signs in the Healthcare and Public Health sector. After analyzing three versions of the firmware, they found an embedded backdoor feature with a hard-coded IP address, referenced as Hidden Functionality: CVE-2025-0626. Additionally, they identified a risk of patient data exposure to unauthorized individuals, described as Exposure of Private Personal Information to an Unauthorized Actor: CVE-2025-0683. Click on the link to read more…

 

Palo Alto Networks Enhances AURL with new HTTP Refresh Header-based Phishing Detector

HTTP Refresh Header-based phishing is a technique used by attackers to deliver malicious web pages. Unlike traditional phishing attacks that rely on HTML content, these attacks embed malicious links in the Refresh header of the server response. This method allows the malicious content to load into the user's browsers before any HTML is processed, all while preserving the appearance of the original legitimate-looking URLs. The lack of visible indicators makes these attacks highly effective and dangerous. Click on the link to read more…

 

Best Practices for Configuration Management Performance on Panorama

This document is being prepared to capture best practices and recommendations for Panorama configuration and usage for scaled deployments in order to get an optimized performance in terms of UX and commit times. This document includes some of the old best practices that are already documented, and some new ones. Click on the link to read more…

 

Unlock the Future of Cybersecurity Transformation: Watch Symphony 2025 ON-DEMAND Today

Missed the live event? No worries — you can now experience the highlights of the Symphony 2025 virtual summit at your convenience. This 1-hour on-demand session is your VIP access to the future of security innovation. Dive into exclusive insights, live demos, and inspiring stories from security professionals who are already conquering the toughest threats with Cortex®. Click on the link to watch the replay…

 

New Update in Palo Alto Network’s Hosted Sinkhole IP Address

As part of our ongoing commitment to strengthening our security infrastructure and optimizing performance, we are implementing an important update that involves changing our DNS Sinkhole Service IP address. This update is designed to enhance the effectiveness of our threat prevention mechanisms, ensuring more accurate detection and mitigation of malicious domains. Click on the link to learn more…

 

Stopping AI-Powered Threats: Palo Alto Networks Detects LLM-Generated Attacks in Real-Time

As AI-driven threats evolve, so must cybersecurity defenses. Palo Alto Networks introduces LLM-Generated Attacks Detection, an advanced security capability designed to counter threats created using large language models (LLMs). Cybercriminals are leveraging AI to craft sophisticated phishing campaigns, automate malware generation, and bypass traditional security measures with unprecedented speed and precision. Click on the link to read more…

 

Managing DeepSeek Traffic with Palo Alto Networks App-IDs

In January 2025, DeepSeek gained attention for its model DeepSeek-R1, which showcased a level of proficiency that rivals the well-established OpenAI O1 but much cheaper. Palo Alto Networks customers have shown 1,800% more interest in DeepSeek since the release of DeepSeek-R1. Despite the appealing performance and cost-effectiveness of DeepSeek, it's crucial to consider the potential risks associated with its use in enterprise environments. Click on the link to learn more…

 

Palo Alto Networks VM-Series NGFW Integration with Nutanix Cloud Cluster (NC2) on AWS

We're thrilled to introduce a new integration that empowers you to configure the Palo Alto Networks VM-Series Virtual Next-Generation Firewalls (NGFWs)  as the default gateway for your Nutanix Cloud Clusters (NC2) instances on AWS subnets. This integration helps embrace the future of secure networking. It empowers you to optimize your AWS environment for both cost-efficiency and enhanced security. Click on the link to read more…

 

 

Catch Up on Threat Vector Podcast Episodes Now!

 

Threat Vector is your compass in the world of cyberthreats. We unravel cyber threat intelligence secrets through engaging discussions, expert interviews, and insightful analysis. Hear our unique threat intelligence, cutting-edge techniques, and real-world case studies. We'll equip you with the knowledge and insight to proactively prepare and stay ahead in the ever-evolving threat landscape.

 

 

Stay in the Loop

 

Be sure to subscribe to our Monthly Rewinds to stay up-to-date on LIVEcommunity news, updates, and more! 

 

 

  • 369 Views
  • 0 comments
  • 1 Likes
Register or Sign-in
Labels
Top Liked Authors