Displaying 1 to 30 of 1729

This China-linked espionage group keeps trying to hack the Cambodian government

There is no shortage of malware that government-backed hackers can get from the public domain, saving them the trouble of developing their own code. But to meet their intelligence-gathering needs, plenty of groups still roll up their sleeves and build their own kits.
  • 1
  • 279

Palo Alto CEO: Balancing our core firewall and next generation businesses

Jim Cramer checks in with Palo Alto CEO Nikesh Arora to hear about the company’s hybrid cloud security acquisition and get a read on where the firm is headed.
  • 0
  • 216

Targeting routers to hit gaming servers.

Researchers at Palo Alto Networks' Unit 42 recently published research outlining attacks on home and small-business routers, taking advantage of known vulnerabilities to make the routers parts of botnets, ultimately used to attack gaming servers.
  • 0
  • 178

Palo Alto Networks Leaps Into SASE Market

Gartner’s hype train gained speed this week as Palo Alto Networks leaped aboard with the launch of its secure access service edge (SASE) platform.
  • 0
  • 308

Palo Alto Networks brings its cyber startup acquisitions together in Prisma Cloud

Palo Alto Networks Inc. today introduced a new version of its Prisma Cloud cybersecurity platform that incorporates the technologies the company gained through its high-profile series of recent startup acquisitions.
  • 1
  • 212

Analysis of Jira Bug Stresses Impact of SSRF in Public Cloud

More than 3,100 Jira instances are still vulnerable to a server-side request forgery vulnerability patched in August.
  • 0
  • 205

Critical Vulnerability Found in Docker Copy

Unit 42, the threat intelligence team at Palo Alto Networks, has released research on a proof of concept for what the company claims might be the most severe Docker copy command (“docker cp”) vulnerability yet to be discovered.
  • 0
  • 196

Hackers target transportation and shipping companies in new trojan malware campaign

Previously unknown malicious tools are being deployed in cyberattacks being conducted by a group researchers have named xHunt - after anime references used in their campaigns.
  • 0
  • 270

5 keys to protect your supply chain from cyberattacks

The SANS Institute recently identified the key components to keep your supply chain secure. Here's why industry experts believe they are important.
  • 0
  • 259

12 Most Exciting Cybersecurity Technologies To Watch At Black Hat 2019

CRN asks 12 executives, sales and technical leaders attending Black Hat 2019 which cybersecurity technologies they're most excited to see come to fruition and how customers and solution providers will benefit.
  • 0
  • 288

America Needs a Whole-of-Society Approach to Cybersecurity. ‘Grand Challenges’ Can Help

In the fifty years since our nation responded to an audacious call to put a man on the moon, we’ve come to idealize not just the achievement itself but how it was achieved—against impossible odds and through force of will and collective action.
  • 0
  • 266

Critical Bug In Harbor Container Registry Gives Admin Access

Attackers can exploit a critical security vulnerability in Harbor cloud native registry for container images to obtain admin privileges on a vulnerable hosting system.
  • 0
  • 238

Critical Vulnerability Exposes Harbor Registries to Attacks

Harbor registries with default settings are impacted by a vulnerability that allows any user to elevate privileges to administrator, Palo Alto Networks reports.
  • 0
  • 247

Free Cybersecurity Training Now Available for U.S. Veterans

A new and free cybersecurity training and certification program called Second Watch has been launched today by Palo Alto Networks to help U.S. veterans find new careers in cybersecurity after their military service is over.
  • 0
  • 200

Monitoring the growing sophistication of PKPLUG.

Researchers from Palo Alto Networks' Unit 42 have been tracking a Chinese cyber espionage group they've named PKPLUG.
  • 0
  • 250

32,000+ WiFi Routers Potentially Exposed to New Gafgyt Variant

Researchers detect an updated Gafgyt variant that targets flaws in small office and home wireless routers from Zyxel, Huawei, and Realtek.
  • 0
  • 293

This aggressive IoT malware is forcing Wi-Fi routers to join its botnet army

Gafgyt has been updated with new capabilities, and it spreads by killing rival malware.
  • 0
  • 279

How can we help employees care about cybersecurity?

  • 0
  • 272

How to negotiate with hackers

When your files are held to ransom, there are ways to get them back safely and securely
  • 0
  • 286

Automation Technology Can Enhance Federal Cybersecurity

AI and machine learning tools free up workers to focus on major threats.
  • 0
  • 226

As America Races to Deploy 5G, Cybersecurity Firms Try to Keep Up

Palo Alto Networks is working to keep up with this rapid deployment on the cybersecurity front. Scott Stevens, CTO of the Global Service Providers business at Palo Alto Networks, joined Cheddar to discuss.
  • 0
  • 278

Docker Containers Riddled with Graboid Crypto-Worm

A worm with a randomized propagation method is spreading via the popular container technology.
  • 0
  • 253

Cryptojacking Worm Targets and Infects 2,000 Docker Hosts

Basic and 'inept' worm managed to compromise Docker hosts by exploiting misconfigurations.
  • 0
  • 244

Unsecured Docker Hosts Attacked by New Graboid Cryptojacking Worm

A new cryptojacking campaign was discovered using Docker images to deliver a worm that follows a seemingly erratic plan where the miner is active for about four minutes at a time on an infected host.
  • 0
  • 237

'Graboid' Crypto-Jacking Worm Targets Docker Hosts

Palo Alto Networks’ security researchers have identified what appears to be the first crypto-jacking worm that spreads using Docker containers.
  • 0
  • 254

Palo Alto Networks launches new version of Demisto SOAR platform

New features to the Demisto platform include a customizable user interface, threat intelligence, database scaling and a mobile app providing chat support and updates for users.
  • 0
  • 271

State-sponsored Chinese hackers have been targeting Southeast Asia since 2013

Researchers have revealed a previously undocumented threat actor of Chinese origin that has run at least six different cyber espionage campaigns in the Southeast Asian region since 2013.
  • 0
  • 354

Chinese cyberespionage group PKPLUG uses custom and off-the-shelf tools

A previously unknown group or collective associated with China is targeting victims in Asia, possibly for geopolitical gain.
  • 0
  • 337

Cyber espionage actor PKPLUG keeps plugging away at targeting SE Asia

Drawing on three years of investigatory work, researchers have assembled a detailed playbook on PKPLUG, a suspected Chinese threat actor targeting Asians with an assortment of malware used for cyber espionage purposes.
  • 0
  • 442

Report: 'PKPLUG' Espionage Campaign Targets Southeast Asia

Unit 42 Researchers Describe Malware Attacks That May Have Ties to China
  • 0
  • 313
Displaying 1 to 30 of 1729