Skip to content
Briefings are running a touch slower this week while we rebuild the foundations.See roadmap
Palo Alto Networks
OrganisationUS

Palo Alto Networks

US cybersecurity vendor; PAN-OS firewalls, Unit 42 threat intel; $8bn+ annual revenue.

Last refreshed: 8 May 2026 · Appears in 3 active topics

Key Question

What role does Palo Alto Networks play in AI security and Iran cyber conflict?

Timeline for Palo Alto Networks

#36 May

Stated first patches for CVE-2026-0300 will not ship until 13 May

Cybersecurity: Threats and Defences: CISA deadline for PAN-OS RCE lands four days early
#319 Apr

Acquired AI-gateway firm Portkey for an estimated $130 million in April 2026

Cybersecurity: Threats and Defences: KB5091157, Gentlemen C2 intel, ENISA CNAs: in brief
#316 Apr

Published threat brief via Unit 42 disclosing CL-STA-1132 tradecraft

Cybersecurity: Threats and Defences: CL-STA-1132 exploited PAN-OS since 16 April, log destruction confirmed
View full timeline →
Common Questions
What is Palo Alto Networks' role in Project Glasswing?
Palo Alto Networks is one of twelve firms selected for Project Glasswing, Anthropic's controlled-access programme for Claude Mythos Preview, receiving $100 million in shared usage credits.Source: Anthropic Glasswing release, 8 April 2026
Did Palo Alto Networks link Handala Hack to the Iranian government?
Yes. Palo Alto Networks attributed Handala Hack, the group that claimed a wiper attack on Stryker Corporation in March 2026, to Iran's Ministry of Intelligence.Source: Iran conflict topic, March 2026
Is Palo Alto Networks a good investment in 2026?
This page covers Palo Alto Networks' role in AI security and geopolitical threats, not investment advice. The company reported FY2025 revenues exceeding $8 billion and holds Glasswing access to frontier AI.Source: entity page
What is the PAN-OS RCE vulnerability exploited in 2026?
CVE-2026-0300 is an unauthenticated Remote Code Execution flaw in Palo Alto PAN-OS captive portal, scored CVSS 9.3. State-sponsored cluster CL-STA-1132 exploited it from 16 April 2026. CISA added it to KEV with a 9 May federal deadline, four days before Palo Alto's own patches shipped.Source: CISA / Palo Alto Unit 42
What is Palo Alto Networks' Unit 42?
Unit 42 is Palo Alto Networks' threat intelligence and Incident Response division. It publishes attribution reports on advanced persistent threat groups and provides IR services to enterprise and government customers. Unit 42 confirmed the CL-STA-1132 exploitation of PAN-OS in May 2026.Source: Palo Alto Networks
Did Palo Alto link Handala Hack to the Iranian government?
Yes. Palo Alto Networks attributed Handala Hack, the group that claimed a wiper attack on Stryker Corporation in March 2026, to Iran's Ministry of Intelligence.Source: Iran conflict topic, March 2026
Why did Palo Alto Networks acquire Portkey?
Palo Alto Networks acquired AI-gateway firm Portkey for approximately $130 million in May 2026 to add AI API routing, observability and security controls to its security platform, extending its AI-native security strategy.Source: Palo Alto / Portkey announcement

Background

Palo Alto Networks is a leading US cybersecurity company offering network security, cloud security, and AI-powered threat intelligence across its Strata, Prisma, and Cortex platforms. With revenues exceeding $8 billion in FY2025, it is one of the largest pure-play cybersecurity firms in the world and a primary vendor to governments and enterprises globally. Its threat research division, Unit 42, produces attribution intelligence and incident-response reports that feed directly into government and enterprise security programmes.

Palo Alto Networks is one of twelve organisations granted access to Anthropic's Claude Mythos Preview through Project Glasswing on 8 April 2026, receiving $100 million in shared model usage credits for a system that scored 83.1% on the CyberGym benchmark.

Palo Alto Networks attributed the Handala Hack group — responsible for a destructive wiper attack on Stryker Corporation in March 2026 — to Iran's Ministry of Intelligence.

In May 2026, Palo Alto's PAN-OS captive-portal component was found to contain CVE-2026-0300, an unauthenticated RCE flaw (CVSS 9.3), exploited since 16 April by state-sponsored cluster CL-STA-1132. Unit 42 confirmed post-exploitation tradecraft including Active Directory enumeration via the firewall's service account and methodical crash-log destruction. CISA added the CVE to KEV with a 9 May federal deadline — four days before Palo Alto's own patches were due. The company simultaneously acquired AI-gateway firm Portkey for approximately $130 million, signalling continued investment in AI security tooling. Palo Alto's dual exposure — as a CVE victim and as an active attributor of nation-state groups — illustrates the structural position of large security vendors at the centre of both the attack surface and the intelligence ecosystem.