[](https://www.paloaltonetworks.com/?ts=markdown) * CN * [USA (ENGLISH)](https://www.paloaltonetworks.com/) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * CHINA (简体中文) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [联系我们](https://www.paloaltonetworks.cn/contact?ts=markdown) * [资源](https://www.paloaltonetworks.cn/resources?ts=markdown) * [获得支持](https://support.paloaltonetworks.com/support) * [遭遇攻击?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * 产品 ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) 产品 [人工智能驱动的网络安全平台](https://www.paloaltonetworks.cn/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.cn/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.cn/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.cn/sase/ai-access-security?ts=markdown) * [云交付的安全服务](https://www.paloaltonetworks.cn/network-security/security-subscriptions?ts=markdown) * [高级威胁预防](https://www.paloaltonetworks.cn/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.cn/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.cn/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.cn/network-security/advanced-dns-security?ts=markdown) * [企业数据丢失防护](https://www.paloaltonetworks.cn/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.cn/network-security/enterprise-device-security?ts=markdown) * [医疗物联网安全](https://www.paloaltonetworks.cn/network-security/medical-iot-security?ts=markdown) * [工业 OT 安全](https://www.paloaltonetworks.cn/network-security/industrial-ot-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.cn/sase/saas-security?ts=markdown) * [新一代防火墙](https://www.paloaltonetworks.cn/network-security/next-generation-firewall?ts=markdown) * [硬件防火墙](https://www.paloaltonetworks.cn/network-security/hardware-firewall-innovations?ts=markdown) * [软件防火墙](https://www.paloaltonetworks.cn/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.cn/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.cn/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.cn/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.cn/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.cn/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.cn/sase?ts=markdown) * [应用加速](https://www.paloaltonetworks.cn/sase/app-acceleration?ts=markdown) * [自主数字体验管理](https://www.paloaltonetworks.cn/sase/adem?ts=markdown) * [企业 DLP](https://www.paloaltonetworks.cn/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.cn/sase/access?ts=markdown) * [Prisma 浏览器](https://www.paloaltonetworks.cn/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.cn/sase/sd-wan?ts=markdown) * [远程浏览器隔离](https://www.paloaltonetworks.cn/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.cn/sase/saas-security?ts=markdown) [基于 AI 的安全运营平台](https://www.paloaltonetworks.cn/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.cn/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.cn/cortex/cloud?ts=markdown) * [应用安全](https://www.paloaltonetworks.cn/cortex/cloud/application-security?ts=markdown) * [云态势安全](https://www.paloaltonetworks.cn/cortex/cloud/cloud-posture-security?ts=markdown) * [云运行时安全](https://www.paloaltonetworks.cn/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.cn/prisma/cloud?ts=markdown) * [Unit 42 托管检测和响应](https://www.paloaltonetworks.cn/cortex/managed-detection-and-response?ts=markdown) * [人工智能驱动的 SOC](https://www.paloaltonetworks.cn/cortex?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.cn/cortex/advanced-email-security?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.cn/cortex/exposure-management?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.cn/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.cn/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.cn/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.cn/cortex/cortex-xpanse?ts=markdown) * [托管 XSIAM](https://www.paloaltonetworks.cn/cortex/managed-xsiam?ts=markdown) * 解决方案 ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) 解决方案 AI 安全 * [安全的人工智能生态系统](https://www.paloaltonetworks.cn/prisma/prisma-ai-runtime-security?ts=markdown) * [安全使用 GenAI](https://www.paloaltonetworks.cn/sase/ai-access-security?ts=markdown) 网络安全 * [云网络安全](https://www.paloaltonetworks.cn/network-security/software-firewalls?ts=markdown) * [数据中心安全](https://www.paloaltonetworks.cn/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.cn/network-security/advanced-dns-security?ts=markdown) * [入侵检测和防御](https://www.paloaltonetworks.cn/network-security/advanced-threat-prevention?ts=markdown) * [IoT Security](https://www.paloaltonetworks.cn/network-security/enterprise-device-security?ts=markdown) * [5G 安全](https://www.paloaltonetworks.cn/network-security/5g-security?ts=markdown) * [确保所有应用、用户和位置的安全](https://www.paloaltonetworks.cn/sase/secure-users-data-apps-devices?ts=markdown) * [确保分支机构转型的安全](https://www.paloaltonetworks.cn/sase/secure-branch-transformation?ts=markdown) * [确保任何设备上的工作安全](https://www.paloaltonetworks.cn/sase/secure-work-on-any-device?ts=markdown) * [VPN 替代](https://www.paloaltonetworks.cn/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web 和网络钓鱼安全](https://www.paloaltonetworks.cn/network-security/advanced-url-filtering?ts=markdown) 云安全 * [应用安全态势管理 (ASPM)](https://www.paloaltonetworks.cn/cortex/cloud/application-security-posture-management?ts=markdown) * [软件供应链安全](https://www.paloaltonetworks.cn/cortex/cloud/software-supply-chain-security?ts=markdown) * [代码安全](https://www.paloaltonetworks.cn/cortex/cloud/code-security?ts=markdown) * [云安全态势管理 (CSPM)](https://www.paloaltonetworks.cn/cortex/cloud/cloud-security-posture-management?ts=markdown) * [云基础架构权限管理 (CIEM)](https://www.paloaltonetworks.cn/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [数据安全态势管理 (DSPM)](https://www.paloaltonetworks.cn/cortex/cloud/data-security-posture-management?ts=markdown) * [AI 安全态势管理 (AI-SPM)](https://www.paloaltonetworks.cn/cortex/cloud/ai-security-posture-management?ts=markdown) * [云检测与响应 (CDR)](https://www.paloaltonetworks.cn/cortex/cloud-detection-and-response?ts=markdown) * [云工作负载保护 (CWP)](https://www.paloaltonetworks.cn/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web 应用及 API 安全 (WAAS)](https://www.paloaltonetworks.cn/cortex/cloud/web-app-api-security?ts=markdown) 安全运营 * [云检测和响应](https://www.paloaltonetworks.cn/cortex/cloud-detection-and-response?ts=markdown) * [网络安全自动化](https://www.paloaltonetworks.cn/cortex/network-security-automation?ts=markdown) * [事件案例管理](https://www.paloaltonetworks.cn/cortex/incident-case-management?ts=markdown) * [SOC 自动化](https://www.paloaltonetworks.cn/cortex/security-operations-automation?ts=markdown) * [威胁情报管理](https://www.paloaltonetworks.cn/cortex/threat-intel-management?ts=markdown) * [托管的检测和响应](https://www.paloaltonetworks.cn/cortex/managed-detection-and-response?ts=markdown) * [攻击面管理](https://www.paloaltonetworks.cn/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [合规性管理](https://www.paloaltonetworks.cn/cortex/cortex-xpanse/compliance-management?ts=markdown) * [互联网运营管理](https://www.paloaltonetworks.cn/cortex/cortex-xpanse/internet-operations-management?ts=markdown) 端点安全 * [端点防护](https://www.paloaltonetworks.cn/cortex/endpoint-protection?ts=markdown) * [扩展的检测和响应](https://www.paloaltonetworks.cn/cortex/detection-and-response?ts=markdown) * [勒索软件防护](https://www.paloaltonetworks.cn/cortex/ransomware-protection?ts=markdown) * [数字取证](https://www.paloaltonetworks.cn/cortex/digital-forensics?ts=markdown) [行业](https://www.paloaltonetworks.cn/industry?ts=markdown) * [公共部门](https://www.paloaltonetworks.com/industry/public-sector) * [金融服务](https://www.paloaltonetworks.com/industry/financial-services) * [制造](https://www.paloaltonetworks.com/industry/manufacturing) * [医疗保健](https://www.paloaltonetworks.com/industry/healthcare) * [中小型企业解决方案](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio) * 服务 ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) 服务 [威胁情报和事件响应服务](https://www.paloaltonetworks.cn/unit42?ts=markdown) * [评估](https://www.paloaltonetworks.cn/unit42/assess?ts=markdown) * [AI 安全评估](https://www.paloaltonetworks.cn/unit42/assess/ai-security-assessment?ts=markdown) * [攻击面评估](https://www.paloaltonetworks.cn/unit42/assess/attack-surface-assessment?ts=markdown) * [防泄露准备工作审核](https://www.paloaltonetworks.cn/unit42/assess/breach-readiness-review?ts=markdown) * [BEC 准备情况评估](https://www.paloaltonetworks.com/bec-readiness-assessment) * [云安全评估](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment) * [入侵评估](https://www.paloaltonetworks.cn/unit42/assess/compromise-assessment?ts=markdown) * [网络风险评估](https://www.paloaltonetworks.cn/unit42/assess/cyber-risk-assessment?ts=markdown) * [并购网络尽职调查](https://www.paloaltonetworks.cn/unit42/assess/mergers-acquisitions-cyber-due-dilligence?ts=markdown) * [渗透测试](https://www.paloaltonetworks.cn/unit42/assess/penetration-testing?ts=markdown) * [紫队演习](https://www.paloaltonetworks.cn/unit42/assess/purple-teaming?ts=markdown) * [勒索软件就绪评估](https://www.paloaltonetworks.cn/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC 评估](https://www.paloaltonetworks.com/unit42/assess/soc-assessment) * [供应链风险评估](https://www.paloaltonetworks.cn/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [桌面演习](https://www.paloaltonetworks.cn/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 顾问人员](https://www.paloaltonetworks.cn/unit42/retainer?ts=markdown) * [响应](https://www.paloaltonetworks.cn/unit42/respond?ts=markdown) * [云事故响应](https://www.paloaltonetworks.cn/unit42/respond/cloud-incident-response?ts=markdown) * [数字取证](https://www.paloaltonetworks.cn/unit42/respond/digital-forensics?ts=markdown) * [事件响应](https://www.paloaltonetworks.cn/unit42/respond/incident-response?ts=markdown) * [托管检测与响应](https://www.paloaltonetworks.cn/unit42/respond/managed-detection-response?ts=markdown) * [托管威胁追踪](https://www.paloaltonetworks.cn/unit42/respond/managed-threat-hunting?ts=markdown) * [托管 XSIAM](https://www.paloaltonetworks.cn/cortex/managed-xsiam?ts=markdown) * [Unit 42 顾问人员](https://www.paloaltonetworks.cn/unit42/retainer?ts=markdown) * [转型](https://www.paloaltonetworks.cn/unit42/transform?ts=markdown) * [事故响应计划制定与审核](https://www.paloaltonetworks.cn/unit42/transform/incident-response-plan-development-review?ts=markdown) * [安全计划设计](https://www.paloaltonetworks.cn/unit42/transform/security-program-design?ts=markdown) * [虚拟 CISO](https://www.paloaltonetworks.cn/unit42/transform/vciso?ts=markdown) * [零信任咨询](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory) [全球客户服务](https://www.paloaltonetworks.cn/services?ts=markdown) * [教育与培训](https://www.paloaltonetworks.com/services/education) * [专业服务](https://www.paloaltonetworks.com/services/consulting) * [成功工具](https://www.paloaltonetworks.com/services/customer-success-tools) * [支持服务](https://www.paloaltonetworks.com/services/solution-assurance) * [客户成功](https://www.paloaltonetworks.com/services/customer-success) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) Unit 42 顾问人员 为满足企业的需求而定制,您可以选择将顾问人员工时数分配给我们的任意产品,包括主动网络风险管理服务。了解如何一键呼叫世界一流的 Unit 42 事故响应团队。 了解更多](https://www.paloaltonetworks.cn/unit42/retainer?ts=markdown) * 合作伙伴 ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) 合作伙伴 NextWave 合作伙伴 * [NextWave 合作伙伴社区](https://www.paloaltonetworks.com/partners) * [云服务提供商](https://www.paloaltonetworks.com/partners/nextwave-for-csp) * [全球系统集成商](https://www.paloaltonetworks.com/partners/nextwave-for-gsi) * [技术合作伙伴](https://www.paloaltonetworks.com/partners/technology-partners) * [服务提供商](https://www.paloaltonetworks.com/partners/service-providers) * [解决方案提供商](https://www.paloaltonetworks.com/partners/nextwave-solution-providers) * [托管安全服务提供商](https://www.paloaltonetworks.com/partners/managed-security-service-providers) 采取行动 * [门户网站登录](https://www.paloaltonetworks.com/partners/nextwave-partner-portal) * [管理的服务计划](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program) * [成为合作伙伴](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [请求访问](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [查找合作伙伴](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE 代表了因其安全专业知识而值得信赖的前 1% 的合作伙伴工程师。 了解更多](https://www.paloaltonetworks.com/cyberforce) * 公司 ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) 公司 Palo Alto Networks * [关于我们](https://www.paloaltonetworks.cn/about-us?ts=markdown) * [管理团队](https://www.paloaltonetworks.com/about-us/management) * [投资者关系](https://investors.paloaltonetworks.com/) * [地点](https://www.paloaltonetworks.com/about-us/locations) * [道德与合规性](https://www.paloaltonetworks.com/company/ethics-and-compliance) * [企业责任](https://www.paloaltonetworks.com/about-us/corporate-responsibility) * [军人和退伍军人](https://jobs.paloaltonetworks.com/military) [为什么选择 Palo Alto Networks?](https://www.paloaltonetworks.cn/why-paloaltonetworks?ts=markdown) * [Precision AI 安全](https://www.paloaltonetworks.cn/precision-ai-security?ts=markdown) * [我们的平台方法](https://www.paloaltonetworks.cn/why-paloaltonetworks/platformization?ts=markdown) * [加速网络安全转型](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio) * [获得的奖项与表彰](https://www.paloaltonetworks.com/about-us/awards) * [客户案例](https://www.paloaltonetworks.cn/customers?ts=markdown) * [全球认证](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance) * [全方位信任计划](https://www.paloaltonetworks.com/resources/whitepapers/trust-360) 职业生涯 * [概述](https://jobs.paloaltonetworks.com/) * [文化与福利](https://jobs.paloaltonetworks.com/culture) [《新闻周刊》评选出的最受欢迎的工作场所 善待员工的企业 阅读更多](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021) * 更多内容 ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) 更多内容 资源 * [博客](https://www.paloaltonetworks.com/blog/?lang=zh-hans) * [Unit 42 威胁研究博客](https://unit42.paloaltonetworks.com/) * [社区](https://www.paloaltonetworks.com/communities) * [内容库](https://www.paloaltonetworks.cn/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.cn/cyberpedia?ts=markdown) * [技术内幕](https://techinsider.paloaltonetworks.com/) * [知识库](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks 频道](https://tv.paloaltonetworks.com/) * [领导者的视角](https://www.paloaltonetworks.com/perspectives/) * [《网络视角》杂志](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine) * [区域云位置](https://www.paloaltonetworks.cn/products/regional-cloud-locations?ts=markdown) * [技术文档](https://docs.paloaltonetworks.com/) * [安全态势评估](https://www.paloaltonetworks.cn/security-posture-assessment?ts=markdown) * [威胁载体播客](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) 联系 * [在线社区](https://live.paloaltonetworks.com/) * [活动资讯](https://events.paloaltonetworks.com/) * [高管简报中心](https://www.paloaltonetworks.com/about-us/executive-briefing-program) * [演示](https://www.paloaltonetworks.cn/demos?ts=markdown) * [联系我们](https://www.paloaltonetworks.cn/company/contact-sales?ts=markdown) [博客 了解行业趋势和全球最大网络安全公司的最新创新 了解更多](https://www.paloaltonetworks.com/blog/?lang=zh-hans) * CN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com/) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * CHINA (简体中文) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [联系我们](https://www.paloaltonetworks.cn/contact?ts=markdown) * [资源](https://www.paloaltonetworks.cn/resources?ts=markdown) * [获得支持](https://support.paloaltonetworks.com/support) * [遭遇攻击?](https://start.paloaltonetworks.com/contact-unit42.html) * [立即开始](https://www.paloaltonetworks.cn/get-started?ts=markdown) 搜索 Close search modal [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.cn/cyberpedia?ts=markdown) 2. [Threats](https://www.paloaltonetworks.com/cyberpedia/threat?ts=markdown) 3. [Ransomware](https://www.paloaltonetworks.cn/cyberpedia/what-is-ransomware?ts=markdown) 4. [什么是勒索软件攻击?](https://www.paloaltonetworks.cn/cyberpedia/ransomware-common-attack-methods?ts=markdown) 目录 * [什么是勒索软件?](https://www.paloaltonetworks.com/cyberpedia/what-is-ransomware?ts=markdown) * [勒索软件攻击是什么样的?](https://www.paloaltonetworks.cn/cyberpedia/what-is-ransomware#what?ts=markdown) * 什么是勒索软件攻击? * [勒索软件攻击是如何发生的?](https://www.paloaltonetworks.cn/cyberpedia/ransomware-common-attack-methods#how?ts=markdown) * [勒索软件的 5 种主要攻击载体是什么?](https://www.paloaltonetworks.cn/cyberpedia/ransomware-common-attack-methods#what?ts=markdown) * [如何评估您的勒索软件准备情况](https://www.paloaltonetworks.cn/cyberpedia/ransomware-common-attack-methods#readiness?ts=markdown) * [勒索软件攻击常见问题解答](https://www.paloaltonetworks.cn/cyberpedia/ransomware-common-attack-methods#faqs?ts=markdown) # 什么是勒索软件攻击? 目录 * * [勒索软件攻击是如何发生的?](https://www.paloaltonetworks.cn/cyberpedia/ransomware-common-attack-methods#how?ts=markdown) * [勒索软件的 5 种主要攻击载体是什么?](https://www.paloaltonetworks.cn/cyberpedia/ransomware-common-attack-methods#what?ts=markdown) * [如何评估您的勒索软件准备情况](https://www.paloaltonetworks.cn/cyberpedia/ransomware-common-attack-methods#readiness?ts=markdown) * [勒索软件攻击常见问题解答](https://www.paloaltonetworks.cn/cyberpedia/ransomware-common-attack-methods#faqs?ts=markdown) 1. 勒索软件攻击是如何发生的? * * [勒索软件攻击是如何发生的?](https://www.paloaltonetworks.cn/cyberpedia/ransomware-common-attack-methods#how?ts=markdown) * [勒索软件的 5 种主要攻击载体是什么?](https://www.paloaltonetworks.cn/cyberpedia/ransomware-common-attack-methods#what?ts=markdown) * [如何评估您的勒索软件准备情况](https://www.paloaltonetworks.cn/cyberpedia/ransomware-common-attack-methods#readiness?ts=markdown) * [勒索软件攻击常见问题解答](https://www.paloaltonetworks.cn/cyberpedia/ransomware-common-attack-methods#faqs?ts=markdown) 勒索软件攻击指的是网络犯罪分子可能用来渗透环境并威胁组织或个人以换取赎金的方法。根据 2022 Unit 42 的《事件响应报告》,攻击者进入系统的具体方式有五种。 ## 勒索软件攻击是如何发生的? Unit 42 ^^®^^ 在 [《2022 年事件响应报告》](https://start.paloaltonetworks.com/2022-unit42-incident-response-report)中报告说,该小组目睹了威胁参与者的快速行动,他们在一个环境中停留的时间中位数仅为 28 天,然后就开始勒索受害者。了解什么是勒索软件攻击以及如何做好准备是保护组织的第一步。 [勒索软件](https://www.paloaltonetworks.cn/cyberpedia/what-is-ransomware?ts=markdown) 首先由网络犯罪分子进入系统并加密所有数据,然后提供解密密钥,如果受害者同意通过加密货币支付赎金。除了进入系统并存入加密恶意软件外,一些勒索软件操作者还会使用多种勒索手段来鼓励用户付款,如复制和渗出未加密的数据、在社交媒体上羞辱受害者、威胁发动 [DDoS](https://www.paloaltonetworks.cn/cyberpedia/what-is-a-ddos-attack?ts=markdown)等额外攻击,或将窃取的信息泄露给客户或在暗网上泄露。 ![How attackers entered an environment to launch a ransomware attack as observed in Unit 42’s 2022 Incident Response Report](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/ransomware-common-attack-methods/video-thumbnail-ransomware-common-attack-methods.jpg) close Unit 42 已经调查了数千起针对不同组织发起的勒索软件攻击,并帮助快速遏制和恢复,为他们节省了数百万美元。在 [《2022 年事件响应报告》](https://start.paloaltonetworks.com/2022-unit42-incident-response-report)中,Unit 42 确定了威胁参与者用来部署勒索软件的五个主要攻击载体。 ## 勒索软件的 5 种主要攻击载体是什么? 为了更好地预防勒索软件,首先了解攻击者用来入侵组织的恶意策略至关重要。通过回顾勒索软件威胁的最新趋势,安全运营中心 (SOC) 可以将资源集中用于潜在的入侵点,降低感染风险,并让整个组织做好准备。 勒索软件的五大攻击载体是 1. 可利用的漏洞 2. 暴力攻击凭证 3. 社会工程学 4. 先前泄露的证书 5. 滥用信任 ![从 Unit 42 的 2022 年事件响应报告中可观测到攻击者如何进入环境发动勒索软件攻击](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/unit42-ir-report-ransomware-initial-access-diagram.png "从 Unit 42 的 2022 年事件响应报告中可观测到攻击者如何进入环境发动勒索软件攻击") ***图 1**:从 Unit 42 的 2022 年事件响应报告中可观测到攻击者如何进入环境发动勒索软件攻击* 了解这五种攻击载体是如何运作的,以及如何最好地保护它们,是做好勒索软件准备的关键第一步。 ### 1.可利用的软件漏洞 [漏洞](https://www.paloaltonetworks.cn/cyberpedia/vulnerability-management?ts=markdown) 有多种形式,可以通过设计代码来利用程序中的漏洞或缺陷。在 [《2022 年 Unit 42 事件响应报告》](https://start.paloaltonetworks.com/2022-unit42-incident-response-report)中,Unit 42 发现 48% 的勒索软件案件始于软件漏洞。当应用程序暴露在互联网上时,威胁参与者可能会扫描并利用已知漏洞,在未经授权的情况下访问环境。 网络犯罪分子中流行的另一种漏洞技术是使用漏洞 [利用工具包](https://www.paloaltonetworks.cn/cyberpedia/what-is-an-exploit-kit?ts=markdown),即在被攻击的网站中插入代码。这些网站看似正常,却包含恶意程序,会扫描连接设备以查找漏洞。如果漏洞利用工具包发现了漏洞,通常会下载恶意软件有效载荷,目的是让威胁参与者远程访问系统。一旦建立了远程访问,威胁参与者就会在环境中部署勒索软件。 软件保护的最佳方法是确保网络上的所有设备经常更新。软件公司会定期发布更新,修补任何已发现的常见漏洞和暴露(CVE),因此在网络犯罪分子访问这些漏洞之前更新这些漏洞至关重要。 [SOC](https://www.paloaltonetworks.cn/cyberpedia/what-is-a-soc?ts=markdown) 可以利用 [Cortex XDR](https://www.paloaltonetworks.cn/cortex/cortex-xdr?ts=markdown) 等 [扩展检测和响应](https://www.paloaltonetworks.cn/cyberpedia/what-is-extended-detection-response-XDR?ts=markdown) (EDR) 产品进一步加强保护,以检测和阻止攻击。为了识别需要修复的面向互联网的漏洞,并自动修复远程桌面协议(RDP)等危险暴露,SOC 可以采用 [Cortex Xpanse](https://www.paloaltonetworks.cn/cortex/cortex-xpanse?ts=markdown)等 [主动攻击面管理](https://www.paloaltonetworks.cn/cyberpedia/what-is-attack-surface-management?ts=markdown) (ASM)工具。 *[了解更多有关结合端点和网络安全的信息](https://www.paloaltonetworks.cn/cyberpedia/5-ways-endpoint-security-and-network-security-should-work-together?ts=markdown)。* ### 2.暴力攻击证书 暴力攻击利用试错来访问系统或应用程序。网络犯罪分子创建并运行脚本,自动输入用户名和密码,直到发现正确登录。这是最古老的网络安全攻击之一,多年来一直保持着成功战术的地位。 暴力攻击是实施多因素身份验证(MFA)如此重要的众多原因之一。具有 MFA 功能的系统要求在允许用户访问系统之前进行额外形式的验证,如来自应用程序的代码或生物识别。 *[了解更多有关防止证书滥用的信息](https://www.paloaltonetworks.cn/cyberpedia/what-is-a-credential-based-attack?ts=markdown)。* 在暴力攻击成功的情况下, [Cortex XSIAM](https://www.paloaltonetworks.cn/cortex/cortex-xsiam?ts=markdown) 等平台会向 SOC 通报异常用户行为,并提示进行调查。Cortex XSIAM 与 MFA 平台无缝集成,可在可疑登录信息发生的第一时间将其传递给分析人员,并阻止暴力攻击。 ### 3.社会工程学 [网络钓鱼](https://www.paloaltonetworks.cn/cyberpedia/what-is-phishing?ts=markdown) 等社会工程学方法是从假装可信的来源发送电子邮件,鼓励受害者点击链接,直接下载 [恶意软件](https://www.paloaltonetworks.cn/cyberpedia/what-is-malware?ts=markdown) 。这些信息往往带有一种潜在的紧迫感或危险性,促使人们在考虑清楚之前就采取行动。这些攻击可能非常成功,就勒索软件而言,极其危险且代价高昂。 对员工实施定期网络安全培训是防范社交工程攻击的最佳方法。当员工发现并报告网络钓鱼企图时,SOC 可以对攻击进行调查,并从中吸取教训。如果网络钓鱼攻击成功, [Cortex XSOAR](https://www.paloaltonetworks.cn/cortex/cortex-xsoar?ts=markdown) 等 [安全协调、自动化和响应](https://www.paloaltonetworks.cn/cyberpedia/what-is-soar?ts=markdown) (SOAR)平台可以简化发现和修复工作,自动关闭受攻击的用户,直到 SOC 完成调查并将攻击者从系统中移除。 ### 4.先前被破坏的证书 当用户凭据被泄露时,尽快更换凭据至关重要。不幸的是,凭据信息可能会在用户不知情的情况下泄露到暗网上,从而让各种攻击者可以不受限制地访问系统。更糟糕的是,许多用户会在多个服务中使用相同的密码,因此,如果一个密码被泄露,重复使用的密码就会被用于其他系统或应用程序,从而获得未经授权的访问权限。 除了多因素身份验证外,鼓励员工养成良好的密码卫生习惯也是一种行之有效的方法,可以防止因凭证泄露而造成的攻击。使用密码管理器、定期更改密码、确保密码的复杂性以及不重复使用相同的密码,都能保护个人和组织的安全。 [Cortex XDR](https://www.paloaltonetworks.cn/cortex/cortex-xdr?ts=markdown) 可以利用行为分析来检测和防止异常用户行为,即使是在使用以前泄露的凭证未经授权进入环境的情况下。 ### 5.滥用信任 在当前混乱的威胁环境中,安全专业人员必须密切关注内部威胁。无论员工是觉得受到了雇主的委屈,还是受到了威胁参与者的攻击,勒索软件最容易从已经拥有合法访问权限的人那里进入环境。 如果发生滥用信任事件, [Cortex XSOAR](https://www.paloaltonetworks.cn/cortex/cortex-xsoar?ts=markdown) 等产品或 [Cortex XSIAM](https://www.paloaltonetworks.cn/cortex/cortex-xsiam?ts=markdown) 等平台可以自动进行事件响应处理,通知安全小组并隔离问题用户。可以通过离职最佳实践实施额外保护,以减少心怀不满的员工可能实施报复的机会。 ### 防范勒索软件攻击 这五种方法都是攻击者入侵系统的破坏性途径。总而言之,我们建议尚未实施以下措施的 SOC 实施这些措施: * [Cortex XDR](https://www.paloaltonetworks.cn/cortex/cortex-xdr?ts=markdown) 等 EDR 平台可识别和阻止攻击 * [Cortex XSIAM](https://www.paloaltonetworks.cn/cortex/cortex-xsiam?ts=markdown) 可实现对端点、网络等的全面自动可见性 * [Cortex Xpanse](https://www.paloaltonetworks.cn/cortex/cortex-xpanse?ts=markdown) 等主动式 ASM 平台可快速识别和自动修复面向互联网的攻击 * SOAR 平台(如 [Cortex XSOAR](https://www.paloaltonetworks.cn/cortex/cortex-xsoar?ts=markdown) )可简化发现过程并自动隔离任何受威胁的用户 * 在允许完全访问环境之前验证用户的 MFA * 在员工中开展良好的安全实践,如网络钓鱼培训和密码卫生,以降低社交工程或暴力攻击的可能性 * 简化前员工离职手续,防止内部攻击 虽然这些方法和平台非常有用,但它们只能帮你到这里。具体到勒索软件,还有一种准备方法是最有利的。 ## 如何评估您的勒索软件准备情况 抵御勒索软件首先要有计划。Unit 42 提供 [勒索软件就绪评估](https://www.paloaltonetworks.cn/unit42/assess/ransomware-readiness-assessment?ts=markdown) ,帮助您更好地预防、检测、应对勒索软件攻击并从中恢复。通过验证您的应对策略、检测隐藏风险等,实现勒索软件就绪状态。 ![概述第 42 单元勒索软件就绪评估的图表](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/unit42-ransomware-readiness-assessment.png "概述第 42 单元勒索软件就绪评估的图表") ***图 2**:概述第 42 单元勒索软件就绪评估的图表* 我们的团队将帮助您做好准备,应对最具挑战性的恶意网络安全威胁。如果您正在遭遇主动入侵或认为您可能受到了网络事件的影响,请 [联系 Unit 42](https://start.paloaltonetworks.com/contact-unit42)。 ## 勒索软件攻击常见问题解答 ### 什么是勒索软件攻击? 网络犯罪分子可能会使用各种方法渗透环境,威胁组织或个人,以换取赎金。 ### 勒索软件攻击者瞄准了哪些攻击载体? 根据《Unit 42 2022 年事件响应报告》,勒索软件攻击者正在利用可利用的漏洞、暴力攻击凭证、社会工程学、以前被泄露的凭证和滥用信任机会。 ### 如何降低 SOC 中的勒索软件风险? 实施 EDR、SOAR 和主动 ASM 平台可以降低勒索软件的风险及其他风险。 ### 如何知道自己是否是勒索软件攻击的受害者? 如果你发现自己的电脑或文件被锁定,除非支付赎金,否则无法访问,你就可能知道自己是勒索软件攻击的受害者。 ### 支付赎金安全吗? 不建议支付赎金,因为不能保证攻击者会释放你的文件,也不能保证你不会再次成为攻击目标。最好寻求专业帮助和建议。 相关内容 [成为勒索软件专家 请阅读这篇对顶级勒索软件集团的实地威胁分析,以及对用来羞辱受害者的较新策略的深入分析。](https://start.paloaltonetworks.cn/2023-unit42-ransomware-extortion-report) [通过 Unit 42 了解当今的攻击事件 去年的战术有助于预测下一年的情况。通过《2022 年事件响应报告》了解攻击者的攻击对象和得手方式。](https://start.paloaltonetworks.com/2022-unit42-incident-response-report) [申请 Cortex 个人演示 与代表联系,分析您的环境,了解 Cortex 产品如何提供效率、先进的可视性和保护。](https://www.paloaltonetworks.tw/cortex/request-demo?ts=markdown) [如何招聘一名 Unit 42 专家 阅读我们的数据表,了解有关 Unit 42 服务的更多信息,以及如何为您的环境特别打造预聘计划。](https://www.paloaltonetworks.cn/resources/datasheets/unit42-retainer?ts=markdown) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=%E4%BB%80%E4%B9%88%E6%98%AF%E5%8B%92%E7%B4%A2%E8%BD%AF%E4%BB%B6%E6%94%BB%E5%87%BB%EF%BC%9F&body=%E6%8E%A2%E7%B4%A2%E5%8B%92%E7%B4%A2%E8%BD%AF%E4%BB%B6%E6%9C%80%E5%B8%B8%E8%A7%81%E7%9A%84%E6%94%BB%E5%87%BB%E6%96%B9%E6%B3%95%EF%BC%8C%E5%8C%85%E6%8B%AC%E8%BD%AF%E4%BB%B6%E6%BC%8F%E6%B4%9E%E3%80%81%E6%9A%B4%E5%8A%9B%E6%94%BB%E5%87%BB%E7%AD%89%E3%80%82%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/ransomware-common-attack-methods) 返回页首 [上一页](https://www.paloaltonetworks.cn/cyberpedia/what-is-ransomware?ts=markdown) 什么是勒索软件? {#footer} ## 产品和服务 * [实时人工智能驱动的网络安全](https://www.paloaltonetworks.cn/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.cn/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.cn/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.cn/sase/ai-access-security?ts=markdown) * [云交付的安全服务](https://www.paloaltonetworks.cn/network-security/security-subscriptions?ts=markdown) * [高级威胁预防](https://www.paloaltonetworks.cn/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.cn/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.cn/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.cn/network-security/advanced-dns-security?ts=markdown) * [企业数据丢失防护](https://www.paloaltonetworks.cn/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.cn/network-security/enterprise-iot-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.cn/network-security/medical-iot-security?ts=markdown) * [工业 OT 安全](https://www.paloaltonetworks.cn/network-security/industrial-ot-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.cn/sase/saas-security?ts=markdown) * [新一代防火墙](https://www.paloaltonetworks.cn/network-security/next-generation-firewall?ts=markdown) * [硬件防火墙](https://www.paloaltonetworks.cn/network-security/hardware-firewall-innovations?ts=markdown) * [软件防火墙](https://www.paloaltonetworks.cn/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.cn/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.cn/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.cn/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.cn/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.cn/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.cn/sase?ts=markdown) * [应用加速](https://www.paloaltonetworks.cn/sase/app-acceleration?ts=markdown) * [自主数字体验管理](https://www.paloaltonetworks.cn/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.cn/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.cn/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.cn/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.cn/sase/sd-wan?ts=markdown) * [远程浏览器隔离](https://www.paloaltonetworks.cn/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.cn/sase/saas-security?ts=markdown) * [基于 AI 的安全运营平台](https://www.paloaltonetworks.cn/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.cn/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.cn/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.cn/cortex/cloud/application-security?ts=markdown) * [云态势安全](https://www.paloaltonetworks.cn/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.cn/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.cn/prisma/cloud?ts=markdown) * [人工智能驱动的 SOC](https://www.paloaltonetworks.cn/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.cn/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.cn/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.cn/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.cn/cortex/cortex-xpanse?ts=markdown) * [Unit 42 托管检测和响应](https://www.paloaltonetworks.cn/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.cn/cortex/managed-xsiam?ts=markdown) * [威胁情报和事件响应服务](https://www.paloaltonetworks.cn/unit42?ts=markdown) * [主动评估](https://www.paloaltonetworks.cn/unit42/assess?ts=markdown) * [事故响应](https://www.paloaltonetworks.cn/unit42/respond?ts=markdown) * [安全策略转型](https://www.paloaltonetworks.cn/unit42/transform?ts=markdown) * [发现威胁情报](https://www.paloaltonetworks.cn/unit42/threat-intelligence-partners?ts=markdown) ## 公司 * [关于我们](https://www.paloaltonetworks.cn/about-us?ts=markdown) * [人才招聘](https://jobs.paloaltonetworks.com/en/) * [联系我们](https://www.paloaltonetworks.cn/company/contact-sales?ts=markdown) * [企业责任](https://www.paloaltonetworks.com/about-us/corporate-responsibility) * [客户](https://www.paloaltonetworks.cn/customers?ts=markdown) * [投资者关系](https://investors.paloaltonetworks.com/) * [位置](https://www.paloaltonetworks.com/about-us/locations) * [新闻资讯](https://www.paloaltonetworks.cn/company/newsroom?ts=markdown) ## 热门链接 * [博客](https://www.paloaltonetworks.com/blog/?lang=zh-hans) * [社区](https://www.paloaltonetworks.com/communities) * [内容库](https://www.paloaltonetworks.cn/resources?ts=markdown) * [网络百科](https://www.paloaltonetworks.com/cyberpedia) * [事件中心](https://events.paloaltonetworks.com/) * [管理电子邮件首选项](https://start.paloaltonetworks.com/preference-center) * [产品清单](https://www.paloaltonetworks.cn/products/products-a-z?ts=markdown) * [产品认证](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance) * [报告漏洞](https://www.paloaltonetworks.com/security-disclosure) * [网站地图](https://www.paloaltonetworks.cn/sitemap?ts=markdown) * [技术文档](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [请勿出售或分享我的个人信息](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [隐私](https://www.paloaltonetworks.com/legal-notices/privacy) * [信任中心](https://www.paloaltonetworks.com/legal-notices/trust-center) * [使用条款](https://www.paloaltonetworks.com/legal-notices/terms-of-use) * [文档](https://www.paloaltonetworks.com/legal) 版权所有 © 2025 Palo Alto Networks。保留所有权利 * [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * CN Select your language