Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Criminal IP and Palo Alto Networks Cortex XSOAR Integrate to Deliver AI-Driven Exposure Intelligence

Criminal IP and Palo Alto Networks Cortex XSOAR Integrate to Deliver AI-Driven Exposure Intelligence

Posted on December 19, 2025December 19, 2025 By CWS

Torrance, United States / California, December nineteenth, 2025, CyberNewsWire

Prison IP (criminalip.io), the AI-powered risk intelligence and assault floor monitoring platform developed by AI SPERA, is now formally built-in into Palo Alto Networks’ Cortex XSOAR.

The combination embeds real-time exterior risk context, publicity intelligence, and automatic multi-stage scanning immediately into Cortex XSOAR’s orchestration engine, giving safety groups increased incident accuracy and quicker response than typical log-centric approaches.

For Palo Alto Networks, broadly considered the worldwide chief in cybersecurity, Cortex XSOAR is a central hub for SOC automation.

With Prison IP added as an integration by the Cortex Market, Cortex XSOAR can now supply customers the power to guage suspicious IPs and domains not solely by static repute knowledge but in addition by behavioral alerts, publicity historical past, infrastructure correlations, and AI-driven risk scoring, with out requiring further techniques or analyst-driven lookups.

AI Context to Handle the Limits of Log-Solely Incident Response

Automated playbook instance — detecting malicious domains utilizing the three-step scan within the built-in API of Prison IP and Palo Alto Networks Cortex XSOAR​​>

Trendy SOC groups face overwhelming alert volumes, but conventional enrichment nonetheless is dependent upon static repute feeds with restricted context, usually lacking port publicity, CVE ties, certificates reuse, DNS modifications, or anonymization habits.

Prison IP fills this hole by repeatedly analyzing world internet-facing belongings and correlating IP habits, area exercise, SSL/TLS knowledge, port states, CVE publicity, IDS hits, and masking indicators.

When an alert consists of an IP or area, Cortex XSOAR can robotically pull this enriched intelligence into the lively incident through a playbook, permitting analysts to evaluate intent and severity with out leaving Cortex SOAR.

Multi-Stage Scanning and Exterior Publicity Linking

Cortex XSOAR playbooks can set off Prison IP’s automated three-stage scanning workflow: starting with a Fast Lookup, escalating to a Lite Scan, after which performing a Full Scan for full assault floor evaluation.

Full Scan outcomes are delivered as structured studies inside Cortex XSOAR, with generic polling making certain the workflow continues with out guide effort.

Past alert-driven enrichment, the mixing additionally hyperlinks inner telemetry with open-internet intelligence offering historic habits, C2 relationships, anonymization indicators, abuse data, and SSL correlations for every indicator.

Cortex XSOAR also can schedule Micro Assault Floor Administration scans to evaluate uncovered ports, certificates validity, susceptible providers, and outdated software program, providing light-weight, steady ASM capabilities that assist organizations establish weaknesses earlier than they’re exploited.

Accelerating the Shift Towards Intelligence-Pushed Autonomous Safety

Screenshot of the Prison IP pack on the Cortex Market

The combination between Palo Alto Networks and Prison IP displays a broader pattern towards autonomous safety operations.

By combining Cortex XSOAR’s automation and orchestration capabilities with Prison IP’s real-time exterior evaluation, SOC groups can automate choices that beforehand required guide analysis throughout a number of intelligence sources.

This reduces response occasions, improves the accuracy of incident classification, and minimizes analyst fatigue—points which have grown extra extreme as alert volumes and AI-generated threats proceed to rise.

Prison IP is already current on Azure, AWS, and Snowflake marketplaces and maintains integrations with greater than 40 safety distributors, together with Cisco, Fortinet, and Tenable. Its growth into the Palo Alto Networks ecosystem units the inspiration for additional integrations throughout XDR and cloud safety options.

AI SPERA CEO Byungtak Kang said that the mixing “demonstrates the rising significance of AI-driven risk intelligence and publicity analytics in enterprise safety operations,” including that Prison IP goals to play a central position in serving to organizations transition towards totally autonomous protection architectures.

About Prison IP

Prison IP is the flagship cyber risk intelligence platform developed by AI SPERA. The platform is utilized in greater than 150 international locations and offers complete risk visibility by enterprise safety options comparable to Prison IP ASM and Prison IP FDS.

Prison IP continues to strengthen its world ecosystem by strategic partnerships with Cisco, VirusTotal and Quad9.

The platform’s risk knowledge can also be accessible by main US knowledge warehouse marketplaces together with Amazon Internet Providers (AWS), Microsoft Azure and Snowflake. This growth improves world entry to top quality risk intelligence from Prison IP.

Customers can study extra:

Contact

Michael Sena

AI SPERA

[email protected]

Cyber Security News Tags:AIdriven, Alto, Cortex, Criminal, Deliver, Exposure, Integrate, Intelligence, Networks, Palo, XSOAR

Post navigation

Previous Post: BlueDelta Hackers Attacking Users of Widely Used Ukrainian Webmail and News Service
Next Post: 25,000+ FortiCloud SSO-Enabled Devices Exposed to Remote Attacks

Related Posts

G_Wagon npm Package Attacking Users to Exfiltrates Browser Credentials using Obfuscated Payload G_Wagon npm Package Attacking Users to Exfiltrates Browser Credentials using Obfuscated Payload Cyber Security News
Decoding PIN-Protected BitLocker Through TPM SPI Analysis To Decrypt And Mount The Disks Decoding PIN-Protected BitLocker Through TPM SPI Analysis To Decrypt And Mount The Disks Cyber Security News
CrowdStrike Set to Acquire Onum in 0 Million Deal to Enhance Falcon Next-Gen SIEM CrowdStrike Set to Acquire Onum in $290 Million Deal to Enhance Falcon Next-Gen SIEM Cyber Security News
How to Solve Alert Fatigue in Your SOC without Extra Staff or Effort How to Solve Alert Fatigue in Your SOC without Extra Staff or Effort Cyber Security News
OpenAI Set to Acquire Analytics Platform Statsig in .1 Billion Agreement OpenAI Set to Acquire Analytics Platform Statsig in $1.1 Billion Agreement Cyber Security News
Notepad++ DLL Hijacking Vulnerability Let Attackers Execute Malicious Code Notepad++ DLL Hijacking Vulnerability Let Attackers Execute Malicious Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark