* [Blog](https://www2.paloaltonetworks.com/blog) * [Security Operations](https://www2.paloaltonetworks.com/blog/security-operations/) * [Must-Read Articles](https://www2.paloaltonetworks.com/blog/security-operations/category/must-read-articles/) * Real-World Email Attacks ... # Real-World Email Attacks Detected by Cortex Advanced Email Security [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fsecurity-operations%2Freal-world-email-attacks-detected-by-cortex-advanced-email-security%2F) [](https://twitter.com/share?text=Real-World+Email+Attacks+Detected+by+Cortex+Advanced+Email+Security&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fsecurity-operations%2Freal-world-email-attacks-detected-by-cortex-advanced-email-security%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fsecurity-operations%2Freal-world-email-attacks-detected-by-cortex-advanced-email-security%2F&title=Real-World+Email+Attacks+Detected+by+Cortex+Advanced+Email+Security&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/security-operations/real-world-email-attacks-detected-by-cortex-advanced-email-security/&ts=markdown) \[\](mailto:?subject=Real-World Email Attacks Detected by Cortex Advanced Email Security) Link copied By [Yitzy Tannenbaum](https://www.paloaltonetworks.com/blog/author/yitzy-tannenbaum/?ts=markdown "Posts by Yitzy Tannenbaum") Oct 09, 2025 6 minutes [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown) [News and Events](https://www.paloaltonetworks.com/blog/security-operations/category/news-and-events/?ts=markdown) [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown) [Use-Cases](https://www.paloaltonetworks.com/blog/security-operations/category/use-cases/?ts=markdown) [advanced email security](https://www.paloaltonetworks.com/blog/tag/advanced-email-security/?ts=markdown) [AI-powered email security](https://www.paloaltonetworks.com/blog/tag/ai-powered-email-security/?ts=markdown) [BEC attacks](https://www.paloaltonetworks.com/blog/tag/bec-attacks/?ts=markdown) [brand impersonation attacks](https://www.paloaltonetworks.com/blog/tag/brand-impersonation-attacks/?ts=markdown) [Cortex email security](https://www.paloaltonetworks.com/blog/tag/cortex-email-security/?ts=markdown) [credential harvesting](https://www.paloaltonetworks.com/blog/tag/credential-harvesting/?ts=markdown) [email threat detection](https://www.paloaltonetworks.com/blog/tag/email-threat-detection/?ts=markdown) [phishing detection](https://www.paloaltonetworks.com/blog/tag/phishing-detection/?ts=markdown) [secure email gateway](https://www.paloaltonetworks.com/blog/tag/secure-email-gateway/?ts=markdown) [social engineering attacks](https://www.paloaltonetworks.com/blog/tag/social-engineering-attacks/?ts=markdown) ***Disclaimer:** The company names and brands referenced in this blog post are mentioned solely as examples of cybercriminals fraudulently impersonating these legitimate organizations. These references do not imply any association, endorsement, or security vulnerabilities with the actual companies mentioned. The legitimate companies had no involvement in these fraudulent activities and all trademarks remain the property of their respective owners.* ## **The Evolution of Email Threats** Cybercriminals are now weaponizing generative AI to create flawless, convincing, and personalized phishing campaigns that can easily bypass traditional security solutions. Traditional Secure Email Gateways (SEGs) and Integrated Cloud Email Security (ICES) solutions analyze emails in isolation, leaving them blind to the subtle, multi-stage attacks that define the modern AI-driven threat landscape. A new approach is needed---one that sees beyond the inbox. The recently launched Advanced Email Security module in Cortex addresses this by correlating threat data across email, identity, endpoints, cloud, SaaS, and the network to see the full attack picture. The following real-world examples from Palo Alto Networks customers demonstrate how this integrated approach stops sophisticated threats that other tools miss. ## **Common Attack Tactics and Themes** ### **Theme 1: Brand Impersonation and Trust Exploitation** Modern attackers have perfected the art of impersonating trusted brands to lower user defenses and bypass security filters. **Financial Services Impersonation - Wells Fargo Campaign** In this sophisticated attack, threat actors impersonated Wells Fargo Bank, targeting multiple users within a financial institution. The attack began with a seemingly routine Google Drive notification about a shared item---a tactic designed to leverage users' inherent trust in legitimate cloud services. ![Image 1: The initial phishing email disguised as a Google Drive notification.](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/10/word-image-346019-1.png) Image 1: The initial phishing email disguised as a Google Drive notification. ![Image 2: The malicious landing page using a CAPTCHA to evade detection.](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/10/word-image-346019-2.png) Image 2: The malicious landing page using a CAPTCHA to evade detection. The document link titled "Unauthorized Activity Noticed" created urgency and alarm, leading to a document with a "VERIFY" button that redirected to a malicious website protected by CAPTCHA. This evasion technique gave users confidence in the site's legitimacy while blocking automated URL scanners. **Streaming Services Impersonation - Netflix and Spotify** Two separate campaigns targeted popular streaming services. The Netflix impersonation used the subject line "We're having trouble with your current billing information," while the Spotify attack warned of "a problem with your billing information." Both campaigns created visual replicas of legitimate communications, using official logos and branding to establish authenticity. ![Image 3: The Netflix brand impersonation email.](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/10/image-png-1.png) Image 3: The Netflix brand impersonation email. **Why Traditional Security Failed:** * Cloud email providers allowed emails to bypass spam filtering due to legitimate service integration * Secure email gateways found no malware or known malicious signatures * Well-formatted HTML emails without attachments passed through standard filters * CAPTCHA protection blocked automated URL analysis tools **How Advanced Email Security Stopped These Attacks:** Advanced Email Security analyzed sender authentication records (SPF, DKIM, DMARC) and recognized brand impersonation signs, including high-reputation logos combined with low-reputation sending domains. The AI-powered detection identified urgent calls-to-action related to financial information as high-risk patterns and blocked the threats in real-time. ### **Theme 2: Hyper-Personalization and Social Engineering** Attackers are leveraging detailed reconnaissance to create highly personalized attacks that appear legitimate and relevant to specific targets. **The Administrator Services Deception** A highly targeted phishing email was sent to a generic but important email address, claiming the user's account was about to expire and needed immediate upgrading. The attack featured flawless execution with a fake but official-looking "2025 Administrator Services" signature and no grammatical errors, making it indistinguishable from legitimate corporate communication. ![Image 4: A hyper-targeted phishing email impersonating an administrator.](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/10/email-content-jpg-1.jpeg) Image 4: A hyper-targeted phishing email impersonating an administrator. **Personalized Document Fraud** This attack impersonated a document sharing service with an email titled "New Document Received." The email specifically addressed the recipient by name and referenced their company, creating strong legitimacy. The link led to a malicious website protected by CAPTCHA to avoid automated detection. ![Image 5: A personalized email lure used in financial document fraud.](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/10/word-image-346019-5.png) Image 5: A personalized email lure used in financial document fraud. **Internal IT Department Spoofing** Attackers impersonated an internal IT department, sending server security upgrade notifications claiming the recipient's mailbox was "out of date." The email used corporate branding and was specifically tailored to the victim's company to appear authentic. **Why Traditional Security Failed:** * Personalization and lack of obvious malicious content bypassed spam filters * No known malicious signatures were present * External emails crafted to appear internal confused basic filtering systems **How Advanced Email Security Stopped These Attacks:** Cortex Advanced Email Security's Large Language Models (LLMs) analyzed underlying intent rather than just scanning for keywords. The AI-powered detection recognized combinations of urgency, impersonation tactics, and suspicious authentication patterns. The system employed "multi-signal" detection, combining multiple context clues to identify sophisticated phishing attempts. ### **Theme 3: Localization and Cultural Targeting** Sophisticated attackers are tailoring campaigns to specific regions and languages to increase effectiveness and evade detection. **Brazilian Invoice Fraud Campaign** This attack demonstrated advanced sophistication through localization. An email sent to a Brazilian company contained what appeared to be a standard invoice written in Portuguese. The attached file was named to mimic legitimate Brazilian invoice format (Nota Fiscal Eletrônica). The "invoice" was actually a malicious dropper hosted on trusted services like Dropbox, configured to force automatic downloads. ![Image 5: The localized Brazilian invoice fraud email.](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/10/word-image-346019-6.png) Image 5: The localized Brazilian invoice fraud email. **Why Traditional Security Failed:** * URLs pointed to trusted domains like Dropbox * Scanners couldn't predict forced downloads of malicious executables * Localized content and formatting appeared legitimate **How Advanced Email Security Stopped This Attack:** Advanced Email Security detected financial fraud intent through deep content inspection. The system identified dangerous combinations including authentication failures and mismatches between displayed link text (.pdf) and actual delivered files (.exe). The LLM's foreign language support enabled effective analysis of localized attacks. ## **The Unified Security Advantage** The attacks targeting organizations today are multifaceted and designed to bypass legacy security controls. These cases demonstrate that traditional email security tools analyzing threats in isolation are frequently evaded. Cortex Advanced Email Security stops modern threats by leveraging a fundamentally different approach: **Cross-Domain Visibility:** Integrating email data with endpoint, identity, and network telemetry allows AI-driven engines to understand full context and true intent behind attacks. **AI-Powered Analysis:** Large Language Models analyze underlying intent rather than relying solely on signatures or keywords, enabling detection of novel and sophisticated attacks. **Multi-Signal Detection:** Combining multiple context clues and behavioral indicators provides comprehensive threat assessment that individual security tools cannot achieve. **Real-Time Correlation:** By correlating threat data across the entire security ecosystem, the solution identifies sophisticated campaigns before they can result in breaches. ## **Conclusion** The modern threat landscape demands a unified security approach. Attackers use diverse tactics---from brand impersonation and localized fraud to internal phishing and social engineering. Security solutions focused only on external threats or known signatures inevitably miss critical indicators. Cortex Advanced Email Security succeeds where traditional tools fail because it enables unified visibility across all attack vectors. By analyzing internal and external emails and correlating that data with endpoint and identity signals, it detects and responds to the full spectrum of email-based threats, securing organizations from every angle. **To learn more, visit our [Cortex Advanced Email Security page](https://www.paloaltonetworks.com/cortex/advanced-email-security).** *** ** * ** *** ## Related Blogs ### [AI and Cybersecurity](https://www.paloaltonetworks.com/blog/security-operations/category/ai-and-cybersecurity/?ts=markdown), [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/security-operations/category/use-cases/?ts=markdown) [#### The Case Files of Detective Aems: A Study in Digital Deduction](https://www2.paloaltonetworks.com/blog/security-operations/the-case-files-of-detective-aems-a-study-in-digital-deduction/) ### [AI and Cybersecurity](https://www.paloaltonetworks.com/blog/security-operations/category/ai-and-cybersecurity/?ts=markdown), [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [News and Events](https://www.paloaltonetworks.com/blog/security-operations/category/news-and-events/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/security-operations/category/use-cases/?ts=markdown) [#### From Silos to Synergy: How Cortex XDL Transforms XDR to Elevate Threat Detection](https://www2.paloaltonetworks.com/blog/security-operations/from-silos-to-synergy-how-cortex-xdl-transforms-xdr-to-elevate-threat-detection/) ### [AI and Cybersecurity](https://www.paloaltonetworks.com/blog/security-operations/category/ai-and-cybersecurity/?ts=markdown), [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [News and Events](https://www.paloaltonetworks.com/blog/security-operations/category/news-and-events/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/security-operations/category/use-cases/?ts=markdown) [#### SE Labs Awards Palo Alto Networks AAA Rating and 100% Prevention Against Ransomware](https://www2.paloaltonetworks.com/blog/security-operations/se-labs-awards-palo-alto-networks-aaa-rating-and-100-prevention-against-ransomware/) ### [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [News and Events](https://www.paloaltonetworks.com/blog/security-operations/category/news-and-events/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/security-operations/category/use-cases/?ts=markdown) [#### How Palo Alto Networks Cortex Helps Federal Agencies Comply with CISA's Binding Operational Directive 23-01](https://www2.paloaltonetworks.com/blog/security-operations/how-palo-alto-networks-cortex-helps-federal-agencies-comply-with-cisas-binding-operational-directive-23-01/) ### [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/security-operations/category/use-cases/?ts=markdown) [#### Cortex ITDR: Cyber Threats in Microsoft Teams and Their Detection](https://www2.paloaltonetworks.com/blog/security-operations/cortex-itdr-cyber-threats-in-microsoft-teams-and-their-detection/) ### [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/security-operations/category/use-cases/?ts=markdown) [#### SCCM: Enterprise Backbone or Attack Vector? Part 2](https://www2.paloaltonetworks.com/blog/security-operations/sccm-enterprise-backbone-or-attack-vector-part-2/) ### Subscribe to Security Operations Blogs! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language