Displaying 1 to 30 of 1688

The Problem With Containerization

Containerization offers plenty of benefits — including potentially smaller server costs — which tempts brands to containerize applications and adopt technologies such as Docker and Kubernetes.
  • 1
  • 128

Americans Want to Protect Their Information, but Don't Know How: Survey

Americans are keen on security, but do not necessarily understand it. This is the conclusion of a new survey of 1,300 Americans undertaken by YouGov, which basically suggests that attitudes towards cybersecurity exceed actions taken to ensure cybersecurity.
  • 0

Never Trust, Always Verify: Demystifying Zero Trust to Secure Your Networks

The point of Zero Trust is not to make networks, clouds, or endpoints more trusted; it's to eliminate the concept of trust from digital systems altogether.
  • 3
  • 153

6 Top Cloud Security Threats To Know About In 2019 (And Beyond)

From compromised credentials to misconfigured containers to the excessive use of privileged accounts, here's a look at six of the biggest cloud security threats technical experts are worried about this year.
  • 2
  • 167

Top 9 Biggest AWS Security Mistakes To Avoid

From failing to address the spread of shadow IT to losing or having credentials stolen to treating containers like traditional appliances or VMs, here are nine of the most common AWS security mistakes seen by technical experts.
  • 1
  • 152

Palo Alto Networks Reports Identify Container Security Concerns

A pair of reports published by Palo Alto Networks makes it apparent that the biggest issue in container security is not how secure the containers are, but rather how they are configured.
  • 2
  • 163

7 Must-Have Cloud Security Certifications In 2019

Technical experts at seven of the world's leading cloud security firms provide their recommendations for which certifications they value most when making hiring decisions or mentoring subordinates.
  • 1
  • 144

Data Breaches Make Zero Trust The New Buzzword In Cybersecurity

Despite huge spending on computer security, the good guys aren't even close to getting the upper hand vs. hackers.
  • 1
  • 260

Palo Alto Networks launches Prisma, a cloud security suite

Palo Alto Networks has launched its new cloud security suite called Prisma, comprised of four platforms -- Prisma Access, Prisma Public Cloud, Prisma SaaS and VM-Series.
  • 0
  • 118

Palo Alto Networks shells out $410M for Portland’s Twistlock and its container security technology

Security will always be one of the top concerns of any major company doing business on the internet, and Palo Alto Networks announced Wednesday that it will acquire Portland-based Twistlock Security for $410 million to help secure the next generation of cloud workloads.
  • 0
  • 100

Palo Alto Networks Launches Prisma Cloud Security as Twistlock Acquisition Rumors Swirl

Palo Alto Networks today rolled out its new Prisma cloud security suite as rumors swirled that the vendor had reached deals to acquire Twistlock and another security startup. The company is also scheduled to report its third quarter 2019 earnings today after the market closes.
  • 1
  • 211

Palo Alto Networks announces Prisma for cloud security

The new cloud security suite is designed to consistently govern access, protect data and secure applications.
  • 0
  • 140

Palo Alto Networks to acquire container security startup Twistlock for $410M

At KubeCon last week in Barcelona, container security was a hot topic, so it shouldn’t come as a surprise that Palo Alto Networks announced today that it was buying container security startup, Twistlock for $410 million.
  • 0
  • 134

Palo Alto Networks launches new ‘Prisma’ cloud security suite

Palo Alto Networks Inc. today announced a new cloud security suite designed to provide easier-to-use advanced security features.
  • 0
  • 107

Nigerian BEC Scammers Use Malware to Up the Ante

Nigerian email scammers have come a long way from the days of asking for money to help a member of the country's royal family.
  • 0
  • 213

SilverTerrier cybergang evolving new techniques for BEC scams

actors have been attributed to more than 51,000 malware samples and 1.1 million cyber attacks over the last four years as they are gaining experience quickly as they adopt new technologies, techniques, and malware to advance their schemes, according to a May 9 blog post.
  • 0
  • 205

ThreatList: Nigerian Cybercrime Surged 54 Percent in 2018

Nigerian scam groups launched even more attacks in 2018 – and used more complex types of malware to reach more victims.
  • 0
  • 156

Nigerian Cybercrime 'Group' Has 400 Malicious Actors

SilverTerrier is not a traditional cybercrime group. It is the collective name Unit 42 of Palo Alto Networks gives to Nigerian cybercriminals. SilverTerrier continues to grow (over 400 individual actors) and evolve (from advance fee and 419 scams to business email compromise (BEC) and malware distribution).
  • 0
  • 163

Nigerian BEC Scammers Shifting to RATs As Tool of Choice

Scammers running business email compromise (BEC) fraud have grown in number, attack more often, and turn to remote access trojans as the preferred malware type to accompany their raids.
  • 0
  • 240

Cybersecurity Jobs Abound. No Experience Required.

Companies like IBM and Palo Alto Networks scramble to hire hundreds of thousands of corporate hackers to defend networks and data
  • 0
  • 292

Despite Doxing, OilRig APT Group Remains a Threat

Despite a doxing of its targets and tools in March, the advanced persistent threat group known as OilRig remains a significant threat to governments and businesses, researchers at Palo Alto Network's Unit 42 report.
  • 0
  • 177

Attackers actively exploiting Atlassian Confluence and Oracle WebLogic flaws

Attackers are actively exploiting recently fixed vulnerabilities in Oracle WebLogic and the Widget Connector macro in Atlassian Confluence to deliver ransomware, mine cryptocurrency and make the compromised machines participate in DDoS attacks.
  • 0
  • 197

Muhstik Botnet Variant Targets Just-Patched Oracle WebLogic Flaw

Researchers are urging Oracle WebLogic users to update quickly – after new Muhstik botnet samples started targeting a critical flaw in the servers.
  • 0
  • 233

Muhstik Botnet Exploits Recent Oracle WebLogic Vulnerability

A recently observed variant of the Muhstik botnet is exploiting a recently disclosed Oracle WebLogic server vulnerability for cryptomining and distributed denial of service (DDoS) attacks.
  • 0
  • 175

Palo Alto Networks Is Putting AI To Work To Help Fight Cyberattacks

Hackers are increasingly automating their attacks, enabling them to exploit vulnerabilities more quickly.
  • 0
  • 218

Leak Reveals Iran’s Wildest Hacker Crew Stole 13,000 Passwords From 98 Organizations

Earlier this month, a prolific hacking group said to be sponsored by Iran had its cyber arsenal leaked. A bundle of tools and target information belonging to the crew, dubbed OilRig, were thrown up on the web for all and sundry to see, marking the most significant leak of Iran's cyber weaponry to date.
  • 0
  • 220

GoDaddy takes down 15,000 subdomains used for online scams

GoDaddy resets passwords for several hundred compromised accounts.
  • 0
  • 200

GoDaddy removes a massive network of bogus sales sites

GoDaddy removed a cluster of more than 15,000 fraudulent website subdomains discovered by a researcher at Palo Alto Networks' Unit 42 threat intelligence team.
  • 0
  • 204

GoDaddy Takes Down 15,000 Spammy ‘Snake Oil’ Subdomains

YOU’VE SEEN THE ads in your email or online: Celebrities supposedly hawking miracle weight-loss cures or galaxy brain supplements.
  • 0
  • 195

New variants of Mirai botnet detected, targeting more IoT devices

Palo Alto Networks researchers spot versions for 5 more processors in the wild.
  • 0
  • 302
Displaying 1 to 30 of 1688