* [Blog](https://www2.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www2.paloaltonetworks.com/blog/corporate/) * [AI and Cybersecurity](https://www2.paloaltonetworks.com/blog/security-operations/category/ai-and-cybersecurity/) * The Ransomware Speed Cris... # The Ransomware Speed Crisis [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2025%2F09%2Fransomware-speed-crisis%2F) [](https://twitter.com/share?text=The+Ransomware+Speed+Crisis&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2025%2F09%2Fransomware-speed-crisis%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2025%2F09%2Fransomware-speed-crisis%2F&title=The+Ransomware+Speed+Crisis&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/2025/09/ransomware-speed-crisis/&ts=markdown) \[\](mailto:?subject=The Ransomware Speed Crisis) Link copied By [Dena De Angelo](https://www.paloaltonetworks.com/blog/author/ddeangelo/?ts=markdown "Posts by Dena De Angelo") Sep 24, 2025 9 minutes [AI and Cybersecurity](https://www.paloaltonetworks.com/blog/security-operations/category/ai-and-cybersecurity/?ts=markdown) [AI Security](https://www.paloaltonetworks.com/blog/category/ai-security/?ts=markdown) [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown) [AI-powered data security](https://www.paloaltonetworks.com/blog/tag/ai-powered-data-security/?ts=markdown) [ransomware](https://www.paloaltonetworks.com/blog/tag/ransomware/?ts=markdown) # **When Cybercriminals Beat the Clock** The dramatic acceleration of ransomware attacks now occurs at machine speed, completing in minutes rather than days. This shift is driven by AI-powered tactics and multi extortion campaigns, rendering traditional human-driven security responses obsolete. There is a critical need for AI-powered detection, automated responses and eXtended Detection and Response (XDR) platforms to build speed-compatible defenses and protect against these evolving threats. ## **From Floppy Disks to Machine Speed --- A Brief History** In 1989, someone at the World Health Organization's AIDS Conference received a floppy disk that would make history, not for advancing medical research, but for unleashing [the first recorded ransomware attack](https://www.cnn.com/2021/05/16/tech/ransomware-joseph-popp/index.html). The AIDS Trojan was primitive by today's standards, but it planted a seed that would grow into one of cybersecurity's most persistent nightmares. ![Graph chart of number of reported compromises and ransomware names.](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/09/word-image-345382-1.png) The most active ransomware leak sites January 2025 through March 2025. Fast-forward to 2025, and that seed has become a sprawling ecosystem of cybercrime that moves at machine speed. What once took weeks now happens in hours. Some attacks complete their objectives (including full data exfiltration) [in as little as 25 minutes](https://www.paloaltonetworks.com/blog/2024/11/unit-42-predicts-top-threats-in-2025/). We're witnessing a speed crisis that's fundamentally reshaping the threat landscape. ## **The Need for Speed (Unfortunately)** The numbers tell a stark story. Unit 42 research reveals that the mean time to exfiltrate (MTTE) has plummeted from nine days in 2021 to just two days in 2023. By 2025, experts predict some incidents could occur in under 30 minutes, [representing attacks that are over 100 times faster than just three years ago](https://www.paloaltonetworks.com/blog/2024/11/unit-42-predicts-top-threats-in-2025). This isn't just an incremental improvement in criminal efficiency; it's a paradigm shift that renders traditional security approaches obsolete. When attackers can complete their entire operation in the time it takes most security teams to grab their morning coffee, the old playbook of detect-analyze-respond becomes dangerously inadequate. The acceleration stems from multiple factors: Artificial intelligence automating reconnaissance and attack execution, initial access brokers commoditizing network entry points and ransomware as a service models that lower technical barriers for cybercriminals. It's the democratization of cybercrime, and it's happening at warp speed. ![The impact of then and now of infiltration, postexploit activity, impacted entities, ransoms.](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/09/word-image-345382-2.png) Ransomware: Then (2017--2019) and Now (2020 and Beyond) ## **AI Is the Criminal's New Best Friend** Artificial intelligence has become the great equalizer in cybercrime, and the statistics are sobering. By 2024, [82.6% of phishing emails used AI technology in some form, with 78% of people opening AI-generated phishing emails](https://tech-adv.com/blog/ai-cyber-attack-statistics/). These aren't your grandfather's Nigerian prince scams, they're sophisticated, personalized attacks that mimic legitimate communication with uncanny accuracy. AI isn't just improving the quality of social engineering; it's accelerating every phase of the attack lifecycle. Automated reconnaissance systems can scan millions of targets for vulnerabilities. AI-powered lateral movement tools can navigate networks faster than human defenders can react. Machine learning algorithms optimize encryption and data exfiltration processes for maximum impact. The result? Attacks that combine the speed of machines with the creativity of human criminals, creating a threat that's both faster and smarter than anything we've faced before. ## **Welcome to the Extortion Olympics** Modern ransomware has evolved far beyond simple "pay to decrypt" schemes. Today's cybercriminals deploy what researchers call "quadruple extortion" -- a multipronged approach that maximizes pressure on victims: * **Encryption** remains the classic move, locking up data and systems. But it's now just one tool in a larger arsenal. * **Data theft** has become a standard operating procedure, with [60% of extortion cases](https://www.paloaltonetworks.com/resources/research/unit-42-incident-response-report-2024) involving stolen information that's threatened for public release. * **Denial-of-service** attacks pummel victims' public-facing infrastructure, compounding operational disruption. * **Harassment** campaigns directly target executives, employees, customers and media contacts, turning cybercrime personal. This multivector approach explains why [86% of ransomware incidents](https://www.paloaltonetworks.com/resources/research/unit-42-incident-response-report-2024) now involve significant business disruption. It's not enough to have good backups anymore (though you absolutely still need them). Attackers have learned to hit organizations where it hurts most: their reputation, customer relationships, operational continuity. Interestingly, about [10% of extortion incidents now skip encryption entirely](https://www.paloaltonetworks.com/resources/research/unit-42-incident-response-report-2024). These "smash and grab" attacks simply steal or delete data, recognizing that the threat of exposure or permanent loss can be just as effective as traditional encryption-based ransoms. ## **The Economics of Cybercrime** The financial stakes have escalated dramatically. The median initial ransom demand jumped almost 80% year-over-year to $1.25 million in 2024, which is roughly 2% of a victim organization's perceived annual revenue. While successful negotiations typically [reduce payments to around $267,500](https://www.paloaltonetworks.com/resources/research/unit-42-incident-response-report), the economic impact extends far beyond ransom payments. Supply chain attacks have surged to become the[second most prevalent attack vector (15%) and second costliest (averaging $4.91 million in damages](https://www.ibm.com/downloads/documents/us-en/131cf87b20b31c91)). When criminals compromise a single vendor, they can access hundreds or thousands of downstream victims, which are a force multiplier that makes these attacks particularly attractive. The rise of initial access brokers has commoditized network intrusions, creating a marketplace where criminals can purchase precompromised systems rather than conducting their own infiltration. It's cybercrime's version of the gig economy, and business is booming. ## **No Safe Harbors** The myth that only large corporations face ransomware threats has been thoroughly debunked. Healthcare leads all U.S. critical infrastructure sectors with 444 reported ransomware and data theft incidents, while [92% of healthcare organizations](https://www.hipaajournal.com/92pc-us-healthcare-organizations-cyberattack-past-year)experienced at least one cyberattack in the past year. But it's not just about sector targeting anymore. Unit 42 research shows that professional and legal services (e.g., high technology, manufacturing, healthcare, finance, wholesale/retail) together account for [63% of incidents](https://start.paloaltonetworks.com/2024-asm-threat-report.html). *The common thread isn't industry, it's vulnerability.* Small businesses face particular challenges. They often lack dedicated security teams but possess valuable data like customer information, financial records and intellectual property. For cybercriminals, they represent low-hanging fruit with potentially high-value payouts. ## **Building Speed-Compatible Defenses** Defending against hyperfast attacks requires a fundamental reimagining of cybersecurity strategy. Traditional approaches that assume days or weeks for detection and response are artifacts of a bygone era. **AI-powered detection** has transitioned from nice-to-have to an absolute necessity. When attacks move in minutes, only machine-speed detection can keep pace. Modern security platforms use behavioral analytics and anomaly detection to identify threats in real-time, often before traditional signature-based systems even know an attack is underway. **Zero trust architecture** assumes every user and device is potentially compromised, requiring verification for every access request. This approach limits lateral movement, one of the key advantages that allows fast attackers to maximize damage. **Automation becomes survival**. Security orchestration, automation and response (SOAR) platforms can contain threats faster than human analysts can even assess them. When speed is the attacker's primary advantage, automated defense becomes the defender's equalizer. **Extended Detection and Response (XDR)** platforms provide the comprehensive visibility needed to track fast-moving threats across endpoints, networks, cloud services and applications. With [70% of incidents spanning three or more attack surfaces](https://www.paloaltonetworks.com/resources/research/2025-incident-response-report), unified visibility isn't luxury; it's survival. ## **The Human Factor in a Machine-Speed World** Paradoxically, as attacks become more automated, the human element becomes more critical. While AI can process vast amounts of data and identify patterns, human analysts provide the context, creativity and strategic thinking that machines lack. The most effective security teams are learning to work with AI as a force multiplier. Instead of drowning in alerts, analysts focus on high-value activities like threat hunting, incident investigation and strategic planning. It's not about replacing humans with machines, it's about amplifying human capabilities with machine intelligence. Training becomes crucial in this new landscape. Security teams need to understand not just traditional threats, but AI-powered attacks. They must learn to work alongside AI systems, interpreting machine-generated insights and making rapid decisions based on automated analysis. ## **The Arms Race Continues** The ransomware speed crisis represents a fundamental shift in the cybersecurity landscape. As attacks continue to accelerate, the window for human-driven response continues to shrink. Organizations that adapt to this new reality (deploying AI-powered defenses, embracing automation and redesigning their security operations) will thrive. Those that cling to traditional approaches will find themselves increasingly vulnerable to threats that move faster than their ability to respond. The future belongs to those who can match machine speed with machine intelligence, human creativity with automated precision and traditional security wisdom with cutting-edge technology. In the race between defenders and attackers, speed isn't just an advantage, it's the new battlefield itself. The question isn't whether ransomware will continue to evolve and accelerate. It's whether your defenses can keep pace. ## **Ready to Match Machine Speed with Machine Intelligence?** The ransomware speed crisis demands a fundamental shift from reactive to proactive security. Traditional tools built for yesterday's threats can't keep up with attacks that complete in minutes rather than days. [Cortex^®^ XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr) and [Cortex^®^ XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xdr) deliver the AI-powered detection and automated response capabilities needed to stop ransomware at machine speed, blocking attacks at every step from initial exploit to behavioral protection. With Unit 42 reporting that [70% of incidents span three or more attack surfaces](https://www.paloaltonetworks.com/resources/research/2025-incident-response-report), the comprehensive visibility offered by Cortex isn't just an advantage; it's essential for survival. When attackers can move from compromise to exfiltration in under 30 minutes, you need security that thinks and responds faster than human analysts can react. For organizations ready to transform their security operations, [Unit 42 managed detection and response (MDR)](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response) extends your team with expertly managed, AI-driven defense, powered by Cortex. Our proactive threat hunters and responders reduce mean time to detect and respond by up to 90%, from hours to minutes. ##### **Take the next steps in ransomware defense. Download our paper,** [*What You Need to Know to Survive Ransomware*](https://www.paloaltonetworks.com/resources/whitepapers/surviving-ransomware?utm_source=Blog9.24-GTM-global-cortex&utm_medium=social)***.*** ##### ***Because when ransomware moves at machine speed, your defenses need to move faster.*** ### Key Takeaways: **1. Attack Speed Has Accelerated 100x** Ransomware attacks that took 9 days in 2021 now complete in as little as 25 minutes, making traditional human-driven response methods obsolete. **2. AI Powers Modern Multi-Extortion Campaigns** 82\.6% of phishing emails now use AI technology, while attackers deploy quadruple extortion tactics including encryption, data theft, denial of service and direct harassment. **3. Machine-Speed Defenses are Now Essential** Organizations need AI-powered detection, automated response systems and XDR platforms to match the speed of modern attacks that span multiple attack surfaces. *** ** * ** *** ## Related Blogs ### [AI Security](https://www.paloaltonetworks.com/blog/category/ai-security/?ts=markdown), [Malware](https://www.paloaltonetworks.com/blog/category/malware-2/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Research](https://www.paloaltonetworks.com/blog/category/research/?ts=markdown), [Unit 42](https://unit42-dev2.paloaltonetworks.com) [#### From Ransom to Revenue Loss](https://www2.paloaltonetworks.com/blog/2025/10/from-ransom-to-revenue-loss/) ### [AI Security](https://www.paloaltonetworks.com/blog/category/ai-security/?ts=markdown), [Financial Services](https://www.paloaltonetworks.com/blog/category/financial-services/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/sase/category/product-features/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/sase/category/use-cases/?ts=markdown) [#### Why Financial Institutions Need a Browser-First Defense](https://www2.paloaltonetworks.com/blog/sase/why-financial-institutions-need-a-browser-first-defense/) ### [AI Security](https://www.paloaltonetworks.com/blog/category/ai-security/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/sase/category/product-features/?ts=markdown) [#### AI and the New Browser Security Landscape](https://www2.paloaltonetworks.com/blog/sase/ai-and-the-new-browser-security-landscape/) ### [AI Security](https://www.paloaltonetworks.com/blog/category/ai-security/?ts=markdown), [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Securing the Agentic Endpoint](https://www2.paloaltonetworks.com/blog/2026/02/securing-the-agentic-endpoint/) ### [AI and Cybersecurity](https://www.paloaltonetworks.com/blog/security-operations/category/ai-and-cybersecurity/?ts=markdown), [AI Security](https://www.paloaltonetworks.com/blog/category/ai-security/?ts=markdown), [Interview](https://www.paloaltonetworks.com/blog/category/interview/?ts=markdown), [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [People of Palo Alto Networks](https://www.paloaltonetworks.com/blog/category/people-of-palo-alto-networks/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [#### When Security Becomes an Afterthought](https://www2.paloaltonetworks.com/blog/2026/02/when-security-becomes-an-afterthought/) ### [AI Security](https://www.paloaltonetworks.com/blog/category/ai-security/?ts=markdown), [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown), [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Securing Every Identity in the Age of AI](https://www2.paloaltonetworks.com/blog/2026/02/securing-every-identity-in-the-age-of-ai/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language