From compromised credentials to misconfigured containers to the excessive use of privileged accounts, here's a look at six of the biggest cloud security threats technical experts are worried about this year.
From failing to address the spread of shadow IT to losing or having credentials stolen to treating containers like traditional appliances or VMs, here are nine of the most common AWS security mistakes seen by technical experts.
Cybersecurity company Palo Alto Networks Inc forecast current-quarter profit below analysts’ estimates on Wednesday, largely due to expenses related to its recent acquisitions and a hit from tariffs, sending its shares down 5%.
Palo Alto Networks today rolled out its new Prisma cloud security suite as rumors swirled that the vendor had reached deals to acquire Twistlock and another security startup. The company is also scheduled to report its third quarter 2019 earnings today after the market closes.
At KubeCon last week in Barcelona, container security was a hot topic, so it shouldn’t come as a surprise that Palo Alto Networks announced today that it was buying container security startup, Twistlock for $410 million.
actors have been attributed to more than 51,000 malware samples and 1.1 million cyber attacks over the last four years as they are gaining experience quickly as they adopt new technologies, techniques, and malware to advance their schemes, according to a May 9 blog post.
SilverTerrier is not a traditional cybercrime group. It is the collective name Unit 42 of Palo Alto Networks gives to Nigerian cybercriminals. SilverTerrier continues to grow (over 400 individual actors) and evolve (from advance fee and 419 scams to business email compromise (BEC) and malware distribution).
Despite a doxing of its targets and tools in March, the advanced persistent threat group known as OilRig remains a significant threat to governments and businesses, researchers at Palo Alto Network's Unit 42 report.
Attackers are actively exploiting recently fixed vulnerabilities in Oracle WebLogic and the Widget Connector macro in Atlassian Confluence to deliver ransomware, mine cryptocurrency and make the compromised machines participate in DDoS attacks.
Earlier this month, a prolific hacking group said to be sponsored by Iran had its cyber arsenal leaked. A bundle of tools and target information belonging to the crew, dubbed OilRig, were thrown up on the web for all and sundry to see, marking the most significant leak of Iran's cyber weaponry to date.
With changing security landscape and increasing compute power and threat vectors, 5G security needs to embrace a holistic protection approach that includes not just the networks, but the end user and IoT devices. Learn about Palo Alto Networks' approach to 5G security with Scott Stevens, CTO for service providers at Palo Alto Networks.