Earlier today to kick off the start of RSA, Palo Alto Networks released multiple announcements:
- Palo Alto Networks introduced Prisma AIRS! A groundbreaking AI security platform designed to protect the entire enterprise AI ecosystem – AI apps, agents, models, and data – at every step.
- Palo Alto Networks announced that it has entered into a definitive agreement to acquire Protect AI. This strategic acquisition reflects Palo Alto Networks’ commitment to remaining at the forefront of next-generation cybersecurity innovation and expanding its capabilities to protect the dynamic new attack surface created by the explosion of AI.
- Palo Alto Networks Bolsters SASE Capabilities for Modern Workplace. Palo Alto Networks announced its latest advancements in Prisma® SASE, the industry’s most comprehensive secure access service edge (SASE) solution, unveiling Prisma Access Browser 2.0, the world’s only SASE-native secure browser. Prisma Access Browser 2.0, along with Endpoint Data Loss Prevention (DLP) and expanded cloud presence with Oracle Cloud Infrastructure (OCI), are new Prisma SASE capabilities designed to secure generative AI (GenAI) usage, improve user experience and enhance operational resilience in the modern workplace.
- Palo Alto Networks Cortex XSIAM Delivers Industry’s First AI-Driven SecOps Platform to Span Proactive and Reactive Security. Palo Alto Networks unveiled Cortex XSIAM® 3.0, the next evolution of its industry-leading SecOps platform, bolstered with proactive exposure management and advanced email security, enabling customers to further consolidate on Cortex for significantly better, faster and more cost-effective security operations.
Authentication Coercion Attacks Abuse Windows to Force Systems into Sending Credentials
Posted in Commentary with tags Palo Alto on November 12, 2025 by itnerdResearchers have uncovered an upsurge in authentication coercion cyber-attacks that abuse Windows Remote Procedure Call (RPC) mechanisms that force systems into sending their credentials to an attacker-controlled system.
You can find out more via this Palo Alto Unit 42 Blog post: https://unit42.paloaltonetworks.com/authentication-coercion/
Jim Routh, Chief Trust Officer at Saviynt, commented:
“Authentication coercion attacks represent a particularly challenging attack vector for enterprises that rely on extensive use of Microsoft architecture and products. These attacks enable lateral movement with limited visibility for the enterprise. There are several remediation steps recommended that generally require strict adherence to limits in how RPC (remote procedure call) is used within the enterprise. The larger and more complex the enterprise, the more difficult it is to enforce the limitations of RPC.
“Enterprises should consider more maturity in how privileged access management (PAM) works, including the use of continuous validation techniques that compare attributes from data streams to established patterns. These techniques measure the deviation from the established pattern mathematically. The deviation threshold (number or score) can trigger automated workflows that restrict access (lateral movement) within milliseconds of an attack attempt. This type of capability is not dependent on humans to detect the threats. It is similar to the way our body’s immune system operates when exposed to bacteria or a virus. Our body’s immune system automatically produces white blood cells and antibodies to attack the bacterial infection. Continuous validation techniques represent a digital immune system response that can take action in milliseconds when lateral movement is automatically identified.”
This is another big hint that organizations need to look at making sure that users are only able to do what they need to do and nothing more. That would make attacks like these way less effective.
Leave a comment »