With changing security landscape and increasing compute power and threat vectors, 5G security needs to embrace a holistic protection approach that includes not just the networks, but the end user and IoT devices. Learn about Palo Alto Networks' approach to 5G security with Scott Stevens, CTO for service providers at Palo Alto Networks.
Most businesses standardize on couple of server, network and storage vendors but are forced to use dozens of security vendors. Palo Alto Networks uses its platform security approach to enable partners to add their IP under the umbrella of a single provider.
Palo Alto Networks’ Unit 42 security division recently discovered malware that targets the Mac platform and enables hackers to steal browser cookies, or login credentials, associated with mainstream cryptocurrency exchanges and wallet service websites.
A group of hackers that specializes in infecting servers with cryptocurrency mining software has started disabling security software agents used in cloud environments to evade detection. Known as Rocke in the security industry, the group has been active since at least April 2018 and is known for exploiting critical vulnerabilities in web application frameworks and servers like Apache Struts, Oracle WebLogic and Adobe ColdFusion.
An attacker group known as Rocke is taking a new approach to installing unauthorized cryptocurrency mining software on cloud servers: They're taking control of systems and uninstalling existing cloud security software.
The Trump administration is prepping a slate of get-tough measures against Chinese government-linked hackers — including indictments, a naming and shaming campaign by multiple federal agencies and possible sanctions against hackers and the organizations that back them.
Cybersecurity researchers have detected new spearphishing and malicious-email campaigns associated with two Russian-government-linked hacking groups known for breaching the Democratic National Committee in 2016.