* [Blog](https://www2.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www2.paloaltonetworks.com/blog/corporate) * internet explorer # Palo Alto Networks ## internet explorer [![Unit 42 Vulnerability Research January 2018 Disclosures - Microsoft](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2016/09/unit42-web-banner-650x300.jpg)](https://www2.paloaltonetworks.com/blog/2018/01/unit42-unit-42-vulnerability-research-january-2018-disclosures-microsoft/) [Unit 42 Vulnerability Research January 2018 Disclosures - Microsoft \-------------------------------------------------------------------](https://www2.paloaltonetworks.com/blog/2018/01/unit42-unit-42-vulnerability-research-january-2018-disclosures-microsoft/) Palo Alto Networks Unit 42 researchers have discovered one vulnerability (CVE-2018-0762) addressed by the Microsoft Security Response Center (MSRC) as part of their January 2018 security update release. [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) Jan 09, 2018 By [Christopher Budd](https://www.paloaltonetworks.com/blog/author/christopher-budd/?ts=markdown "Posts by Christopher Budd") ## Palo Alto Networks *** ** * ** *** [Announcements](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown) *** ** * ** *** [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown) *** ** * ** *** [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) *** ** * ** *** [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) *** ** * ** *** [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) *** ** * ** *** [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown) *** ** * ** *** ![Palo Alto Networks Unit 42 Vulnerability Research December 2017 Disclosures - Microsoft](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2016/09/unit42-web-banner-650x300.jpg) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Palo Alto Networks Unit 42 Vulnerability Research December 2017 Disclosures...](https://www2.paloaltonetworks.com/blog/2017/12/unit42-palo-alto-networks-unit-42-vulnerability-research-december-2017-disclosures-microsoft/) Palo Alto Networks Unit 42 vulnerability disclosures: December 2017. Dec 19, 2017 By [Christopher Budd](https://www.paloaltonetworks.com/blog/author/christopher-budd/?ts=markdown "Posts by Christopher Budd") ![Palo Alto Networks Unit 42 Vulnerability Research November 2017 Disclosures](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2016/09/unit42-web-banner-650x300.jpg) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Palo Alto Networks Unit 42 Vulnerability Research November 2017 Disclosures](https://www2.paloaltonetworks.com/blog/2017/11/unit42-palo-alto-networks-unit-42-vulnerability-research-november-2017-disclosures/) Palo Alto Networks Unit 42 vulnerability research November 2017 disclosures. Nov 22, 2017 By [Christopher Budd](https://www.paloaltonetworks.com/blog/author/christopher-budd/?ts=markdown "Posts by Christopher Budd") ![Palo Alto Networks Unit 42 Vulnerability Research September and October 2017 Disclosures](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2016/09/unit42-web-banner-650x300.jpg) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Palo Alto Networks Unit 42 Vulnerability Research September and October 201...](https://www2.paloaltonetworks.com/blog/2017/10/unit42-palo-alto-networks-unit-42-vulnerability-research-september-october-2017-disclosures/) Palo Alto Networks researcher discovers four new critical vulnerabilities. Oct 11, 2017 By [Christopher Budd](https://www.paloaltonetworks.com/blog/author/christopher-budd/?ts=markdown "Posts by Christopher Budd") ![Palo Alto Networks Unit 42 Vulnerability Research August 2017 Disclosures](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2016/09/unit42-web-banner-650x300.jpg) [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Palo Alto Networks Unit 42 Vulnerability Research August 2017 Disclosures](https://www2.paloaltonetworks.com/blog/2017/08/unit42-palo-alto-networks-unit-42-vulnerability-research-august-2017-disclosures/) Palo Alto Networks Unit 42 researchers have discovered one remote code execution vulnerabilities affecting Microsoft Internet Explorer 9 and 10 Aug 18, 2017 By [Christopher Budd](https://www.paloaltonetworks.com/blog/author/christopher-budd/?ts=markdown "Posts by Christopher Budd") [](https://www2.paloaltonetworks.com/blog/2016/07/palo-alto-networks-news-of-the-week-july-16-2016/) [Events](https://www.paloaltonetworks.com/blog/category/events/?ts=markdown), [News of the Week](https://www.paloaltonetworks.com/blog/category/news-of-the-week/?ts=markdown) ## [Palo Alto Networks News of the Week -- July 16, 2016](https://www2.paloaltonetworks.com/blog/2016/07/palo-alto-networks-news-of-the-week-july-16-2016/) In case you missed it, catch up on all of our top news from this past week right here.Palo Alto Networks researchers discovered two critical Internet Explorer vulnerabilities. Jul 16, 2016 By [Anna Lough](https://www.paloaltonetworks.com/blog/author/anna-lough/?ts=markdown "Posts by Anna Lough") [](https://www2.paloaltonetworks.com/blog/2016/07/unit42-palo-alto-networks-researchers-discover-two-critical-internet-explorer-vulnerabilities/) [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown), [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Palo Alto Networks Researchers Discover Two Critical Internet Explorer Vuln...](https://www2.paloaltonetworks.com/blog/2016/07/unit42-palo-alto-networks-researchers-discover-two-critical-internet-explorer-vulnerabilities/) Palo Alto Networks researchers discovered two new critical Internet Explorer (IE) vulnerabilities affecting IE versions 9, 10, and 11. Both are included in Microsoft's July 2016 Se... Jul 13, 2016 By [Ryan Olson](https://www.paloaltonetworks.com/blog/author/ryan-olson/?ts=markdown "Posts by Ryan Olson") [](https://www2.paloaltonetworks.com/blog/2016/03/palo-alto-networks-news-of-the-week-march-26/) [Events](https://www.paloaltonetworks.com/blog/category/events/?ts=markdown), [News of the Week](https://www.paloaltonetworks.com/blog/category/news-of-the-week/?ts=markdown) ## [Palo Alto Networks News of the Week -- March 26](https://www2.paloaltonetworks.com/blog/2016/03/palo-alto-networks-news-of-the-week-march-26/) The Palo Alto Networks threat intelligence team, Unit 42, observed Locky ransomware installed through nuclear exploit kits. Our researchers also examined the campaign evolution of Darkleech to pseudo-Darkleech... Mar 26, 2016 By [Anna Lough](https://www.paloaltonetworks.com/blog/author/anna-lough/?ts=markdown "Posts by Anna Lough") [](https://www2.paloaltonetworks.com/blog/2016/03/unit42-palo-alto-networks-researchers-discover-critical-ie-vulnerabilities/) [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown), [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Palo Alto Networks Researchers Discover Critical IE Vulnerabilities](https://www2.paloaltonetworks.com/blog/2016/03/unit42-palo-alto-networks-researchers-discover-critical-ie-vulnerabilities/) Palo Alto Networks researchers Tongbo Luo and Hui Gao were credited with the discoveries of new critical Microsoft vulnerabilities affecting Internet Explorer (IE) versions 7, 8, 9... Mar 25, 2016 By [Ryan Olson](https://www.paloaltonetworks.com/blog/author/ryan-olson/?ts=markdown "Posts by Ryan Olson") [](https://www2.paloaltonetworks.com/blog/2016/03/unit-42-palo-alto-networks-researcher-discovers-critical-ie-vulnerability/) [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown), [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Palo Alto Networks Researcher Discovers Critical IE Vulnerability](https://www2.paloaltonetworks.com/blog/2016/03/unit-42-palo-alto-networks-researcher-discovers-critical-ie-vulnerability/) Palo Alto Networks researcher Hui Gao was credited with the discovery of a new critical Microsoft vulnerability affecting Internet Explorer (IE) versions 9, 10 and 11. This vulnera... Mar 09, 2016 By [Ryan Olson](https://www.paloaltonetworks.com/blog/author/ryan-olson/?ts=markdown "Posts by Ryan Olson") [](https://www2.paloaltonetworks.com/blog/2016/02/securing-the-unpatchable-how-to-prevent-security-breaches-when-you-cannot-patch/) [Endpoint](https://www.paloaltonetworks.com/blog/category/endpoint-2/?ts=markdown) ## [Securing the Unpatchable: How to Prevent Security Breaches When You Cannot ...](https://www2.paloaltonetworks.com/blog/2016/02/securing-the-unpatchable-how-to-prevent-security-breaches-when-you-cannot-patch/) There are no flawless software systems or applications. Flaws often create security vulnerabilities that attackers can exploit to compromise systems and software. That is the prima... Feb 09, 2016 By [Michael Moshiri](https://www.paloaltonetworks.com/blog/author/michael-moshiri/?ts=markdown "Posts by Michael Moshiri") [](https://www2.paloaltonetworks.com/blog/2015/12/palo-alto-networks-researchers-discover-critical-vulnerabilities-in-internet-explorer-and-microsoft-edge/) [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown), [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Palo Alto Networks Researchers Discover Critical Vulnerabilities in Interne...](https://www2.paloaltonetworks.com/blog/2015/12/palo-alto-networks-researchers-discover-critical-vulnerabilities-in-internet-explorer-and-microsoft-edge/) Palo Alto Networks researchers Bo Qu and Hui Gao were credited with the discovery of three new critical Microsoft vulnerabilities affecting Internet Explorer (IE) versions 7, 8, 9,... Dec 10, 2015 By [Ryan Olson](https://www.paloaltonetworks.com/blog/author/ryan-olson/?ts=markdown "Posts by Ryan Olson") [](https://www2.paloaltonetworks.com/blog/2015/11/palo-alto-networks-researcher-discovers-critical-vulnerabilities-in-internet-explorer-and-microsoft-edge/) [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown), [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Palo Alto Networks Researcher Discovers Critical Vulnerabilities in Interne...](https://www2.paloaltonetworks.com/blog/2015/11/palo-alto-networks-researcher-discovers-critical-vulnerabilities-in-internet-explorer-and-microsoft-edge/) Palo Alto Networks researcher Bo Qu was credited with discovery of six new critical Microsoft vulnerabilities affecting Internet Explorer (IE) versions 7, 8, 9, 10 and 11 and Micro... Nov 11, 2015 By [Ryan Olson](https://www.paloaltonetworks.com/blog/author/ryan-olson/?ts=markdown "Posts by Ryan Olson") [](https://www2.paloaltonetworks.com/blog/2015/10/palo-alto-networks-researcher-discovers-critical-ie-vulnerability/) [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown), [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Palo Alto Networks Researcher Discovers Critical IE Vulnerability](https://www2.paloaltonetworks.com/blog/2015/10/palo-alto-networks-researcher-discovers-critical-ie-vulnerability/) Palo Alto Networks researcher Hui Gao was credited with discovery of a new critical Internet Explorer (IE) vulnerability affecting IE versions 6, 7, 8, 9, 10 and 11. CVE-2015-2548... Oct 27, 2015 By [Ryan Olson](https://www.paloaltonetworks.com/blog/author/ryan-olson/?ts=markdown "Posts by Ryan Olson") [](https://www2.paloaltonetworks.com/blog/2015/09/palo-alto-networks-news-of-the-week-september-12/) [Events](https://www.paloaltonetworks.com/blog/category/events/?ts=markdown), [Fuel User Group](https://www.paloaltonetworks.com/blog/category/fuel-user-group/?ts=markdown), [News of the Week](https://www.paloaltonetworks.com/blog/category/news-of-the-week/?ts=markdown) ## [Palo Alto Networks News of the Week -- September 12](https://www2.paloaltonetworks.com/blog/2015/09/palo-alto-networks-news-of-the-week-september-12/) Here is all of the top Palo Alto Networks news from this past week.Unit 42 analyzed Musical Chairs, a multi-year campaign, and unveiled a newly deployed variant of Gh0st malware, "Piano Gh0st." Sep 12, 2015 By [Chad Berndtson](https://www.paloaltonetworks.com/blog/author/cberndston/?ts=markdown "Posts by Chad Berndtson") [](https://www2.paloaltonetworks.com/blog/2015/09/palo-alto-networks-researchers-discover-critical-vulnerabilities-in-internet-explorer-and-adobe-shockwave-player/) [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown), [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Palo Alto Networks Researchers Discover Critical Vulnerabilities in Interne...](https://www2.paloaltonetworks.com/blog/2015/09/palo-alto-networks-researchers-discover-critical-vulnerabilities-in-internet-explorer-and-adobe-shockwave-player/) Palo Alto Networks researchers have been credited with discovery of new vulnerabilities affecting Adobe Shockwave Player and Microsoft Internet Explorer. Sep 09, 2015 By [Ryan Olson](https://www.paloaltonetworks.com/blog/author/ryan-olson/?ts=markdown "Posts by Ryan Olson") [](https://www2.paloaltonetworks.com/blog/2015/07/ups-observations-on-cve-2015-3113-prior-zero-days-and-the-pirpi-payload/) [Malware](https://www.paloaltonetworks.com/blog/category/malware-2/?ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown), [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [UPS: Observations on CVE-2015-3113, Prior Zero-Days and the Pirpi Payload](https://www2.paloaltonetworks.com/blog/2015/07/ups-observations-on-cve-2015-3113-prior-zero-days-and-the-pirpi-payload/) A June 23 FireEye blog post titled "Operation Clandestine Wolf" discussed a cyber espionage group, known as APT3, that had been exploiting a zero-day... Jul 27, 2015 By [Robert Falcone](https://www.paloaltonetworks.com/blog/author/robert-falcone/?ts=markdown "Posts by Robert Falcone") and [Richard Wartell](https://www.paloaltonetworks.com/blog/author/richard-wartell/?ts=markdown "Posts by Richard Wartell") [](https://www2.paloaltonetworks.com/blog/2015/07/palo-alto-networks-news-of-the-week-july-18/) [Events](https://www.paloaltonetworks.com/blog/category/events/?ts=markdown), [News of the Week](https://www.paloaltonetworks.com/blog/category/news-of-the-week/?ts=markdown) ## [Palo Alto Networks News of the Week -- July 18](https://www2.paloaltonetworks.com/blog/2015/07/palo-alto-networks-news-of-the-week-july-18/) We've captured all of the top Palo Alto Networks news from this past week right here. Jul 18, 2015 By [Chad Berndtson](https://www.paloaltonetworks.com/blog/author/cberndston/?ts=markdown "Posts by Chad Berndtson") [](https://www2.paloaltonetworks.com/blog/2015/07/palo-alto-networks-researcher-discovers-two-critical-internet-explorer-vulnerabilities/) [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown), [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Palo Alto Networks Researcher Discovers Two Critical Internet Explorer Vuln...](https://www2.paloaltonetworks.com/blog/2015/07/palo-alto-networks-researcher-discovers-two-critical-internet-explorer-vulnerabilities/) Palo Alto Networks researcher Bo Qu discovered two new critical Internet Explorer (IE) vulnerabilities affecting IE versions 6, 7, 8, 9, 10, and 11. Both are included in Microsoft'... Jul 16, 2015 By [Ryan Olson](https://www.paloaltonetworks.com/blog/author/ryan-olson/?ts=markdown "Posts by Ryan Olson") [](https://www2.paloaltonetworks.com/blog/2015/06/palo-alto-networks-news-of-the-week-june-13/) [Events](https://www.paloaltonetworks.com/blog/category/events/?ts=markdown), [News of the Week](https://www.paloaltonetworks.com/blog/category/news-of-the-week/?ts=markdown) ## [Palo Alto Networks News of the Week -- June 13](https://www2.paloaltonetworks.com/blog/2015/06/palo-alto-networks-news-of-the-week-june-13/) Check out all of the top Palo Alto Networks news from the past week. Jun 13, 2015 By [Chad Berndtson](https://www.paloaltonetworks.com/blog/author/cberndston/?ts=markdown "Posts by Chad Berndtson") [](https://www2.paloaltonetworks.com/blog/2015/06/palo-alto-networks-researcher-discovers-3-critical-internet-explorer-vulnerabilities-2/) [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown), [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ## [Palo Alto Networks Researcher Discovers 3 Critical Internet Explorer Vulner...](https://www2.paloaltonetworks.com/blog/2015/06/palo-alto-networks-researcher-discovers-3-critical-internet-explorer-vulnerabilities-2/) Palo Alto Networks researcher Bo Qu discovered three new critical Internet Explorer (IE) vulnerabilities affecting IE versions 6, 7, 8, 9, 10 and 11. All three are included in Micr... Jun 09, 2015 By [Ryan Olson](https://www.paloaltonetworks.com/blog/author/ryan-olson/?ts=markdown "Posts by Ryan Olson") Load more blogs Load more blogs ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language