Welcome to the Threat and Vulnerability Forum
The purpose of this forum is to discuss security vulnerabilities and threats. Palo Alto Networks believes that understanding todays threat landscape is critical to effectively detecting and preventing cybersecurity attacks. We would like to provide an environment in which to foster discussion of vulnerabilities, malware, and other threats with a focus on how to effectively detect and prevent their impact through successfully deploying the Palo Alto Networks security platform.
Reporting vulnerabilities in Palo Alto Networks products should be directed to our Product Security Incident Response Team (PSIRT) for investigation. Details of which can be found here: https://www.paloaltonetworks.com/security-disclosure.
When creating a discussion, try to provide as much detail as possible to better assist your peers in understanding what exactly you need.
Additionally, please sure to bookmark and visit our Unit 42 Research blog frequently for the latest in-depth research and insight into the continually evolving threat landscape: http://researchcenter.paloaltonetworks.com/unit42/
Finally, be sure to keep up-to-date with all posts to this board by subscribing for notification alerts on new posts and replies. Here's an article on how to subscribe: https://live.paloaltonetworks.com/t5/Getting-Started/Email-Notifications-for-Subscribed-Activities/t...
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!
The Live Community thanks you for your participation!