By Year

By Type

  • In The News (1288)

By Topic

  • Cybersecurity (44)

By Product Category

By Services

By Technologies

By Industry

By Audience

  • Business (1338)

By Language

Displaying 1 to 30 of 1538

This Stealthy Malware Remained Unnoticed for Three Years

Stealthy command and control methods allowed a newly discovered malware family to fly under the radar for more than three years, Palo Alto Networks security researchers reveal. Dubbed Dimnie, the threat was discovered in mid-January 2017, when it was targeting open-source developers via phishing emails.

  • 0
  • 3

Why Healthcare Network Security is a Critical Provider Tool

Covered entities are quickly implementing more technology into daily operations, which could potentially open the door for cyber criminals or even unauthorized insider access. Healthcare network security measures must be current and comprehensive, ensuring that patient data does not fall into the wrong hands.

  • 0
  • 4

As Malware Gets Smarter, Bare Metal Analysis Can Keep You Secure

Android adware has embraced an innovative way to promote potentially malicious apps: abuse Android plugin frameworks. They say a rising tide lifts all boats; unfortunately, the proverb applies to cybercriminals, too. While the inexpensive availability of compute processing power and broadband connectivity has made technologies like virtualization and cloud computing possible, that same ready access makes it possible for even a novice cybercriminal to leverage some of the most advanced malware available today.

  • 0
  • 24

Android adware abusing plugin frameworks to promote potentially malicious apps

Android adware has embraced an innovative way to promote potentially malicious apps: abuse Android plugin frameworks. App promotion isn't anything new on the Android platform. In the past, we've seen adware install paid applications once they've landed on an device. But to the chagrin of these less-than-honest developers, anti-malware technology can block these efforts.

  • 0
  • 56

Two-factor authentication, one-time passwords key to prevent credential theft: Report

Another vendor has joined the crowd of voices urging infosec pros to enable two-factor or multi-factor authentication where they can to better secure IT systems. Effective prevention of credential theft should focus on four strategies: Having more than one factor of authentication, one-time passwords, password managers and employee training, a discussion paper released Tuesday by the Unit 42 intelligence division of Palo Alto Networks.

  • 0
  • 60

The CyberWire Daily Podcast for 03.17.17

Palo Alto Networks Rick Howard describes a capture-the-flag collaboration.

  • 0
  • 119

New cloud-based keylogger gaining momentum among criminals

A new cloud-based keylogger malware family is slowly but surely gaining momentum among criminals on underground web marketplaces. The malware, dubbed "NexusLogger", appears to have first arrived on the keylogging scene at the beginning of 2017.

  • 0
  • 73

Protecting the enterprise against mobile threats

Mobile devices have transformed the digital enterprise allowing employees to access the information they need to be most productive from virtually anywhere. Has that convenience come at a cost to enterprise security, though?

  • 0
  • 171

RanRan Ransomware being as a political tool

Palo Alto's Unit 42 research group has observed a new ransomware campaign that attempts to extort Middle Eastern organizations into posting political statements instead of a monetary payment.

  • 0
  • 171

Palo Alto Networks & Next-Gen Security Innovators

Sometimes Wall Street investors and channel partners don’t exactly see eye to eye. Such is the case in recent days. Indeed, Wall Street wants even faster growth from Palo Alto Networks. But channel partners seem pretty darn pleased with the company’s next-generation security strategy.

  • 0
  • 71

Case Study: Community Hospital Tackles Secure Access

Implementing robust access controls in healthcare settings can be particularly challenging for several reasons. But Fisher-Titus Medical Center is making progress in strengthening its authentication and other security controls, says Peter Jacob, the community hospital's manager of IT operations and infrastructure.

  • 0
  • 171

A phishing campaign about nothing

A new phishing campaign that has taken a Jerry Seinfeld-like approach with its scam by making the email about nothing by not including any text in the email body, just an attachment, is also abusing web hosting providers at a prodigious rate.

  • 0
  • 210

What's Next in Cybersecurity? Ripped From the RSA Conference Floor

The security industry wrapped up what has arguably become the most significant trade show in the security industry: RSA Conference. While it’s always interesting to see what challenges hold the industry’s attention and how vendors plan to address them, I find the most useful information comes from informal conversations with customers and industry colleagues as opposed to official booth presentations.

  • 0
  • 169

132 Google Play apps found containing malicious iframes

Researchers with Palo Alto Networks today reported finding 132 Android apps on Google Play whose HTML code was injected with hidden, malicious iframes, likely due to malware infecting a development platform used by the apps' creators. The apps, which were spawned by seven different developers, mostly contained carefully concealed HTML-based iframe tags that connected to two heavily obfuscated malicious domains.

  • 0
  • 242

Old Windows malware may have tampered with 132 Android apps

More than 130 Android apps on the Google Play store have been found to contain malicious coding, possibly because the developers were using infected computers, according to security researchers. The 132 apps were found generating hidden iframes, or an HTML document embedded inside a webpage, linking to two domains that have hosted malware, according to security firm Palo Alto Networks.

  • 0
  • 178

132 Google Play apps tried to infect Android users with…Windows malware

It's a mystery that left researchers scratching their heads: 132 Android apps in the official Google Play market attempted to infect users with... Windows malware. The apps, which were spawned by seven different developers, mostly contained carefully concealed HTML-based iframe tags that connected to two heavily obfuscated malicious domains.

  • 0
  • 221

"Gamaredon" Group Uses Custom Malware in Ukraine Attacks

The group has been active since at least mid-2013, but its activities were first detailed in April 2015 by LookingGlass. The security firm’s analysis focused on Operation Armageddon, a cyber espionage campaign targeting Ukrainian government, military and law enforcement officials.

  • 0
  • 220

Four Cybersecurity Resolutions for 2017

2016 was a big year for cybersecurity news, most of it not terribly encouraging. Still, the year did present the cybersecurity industry with several teachable moments that I believe all security professionals should heed as we move into a new year.

  • 0
  • 383

Integração impulsiona inteligência e inovação em Segurança Cibernética

C-Levels da Palo Alto Networks afirmam na RSA Conference que estratégias de segurança precisam ser pautadas em visibilidade e apontam a integração de tecnologias como a melhor aliada no combate ao cibercrime

  • 0
  • 305

4 reasons to prioritize cloud security this year

A tremendous amount of healthcare data will be moved to the Amazon Web Services and Microsoft Azure clouds for either private or public use in 2017. It makes sense, because hospital leaders are of the mindset that they prefer to be in the business of treating patients, rather than managing data centers.

  • 0
  • 185

Security platforms to disrupt industry, predicts Palo Alto Networks

Security platforms with open application programming interfaces (APIs) are set to turn the business model for the information security on its head, according to Mark McLaughlin, president and CEO of Palo Alto Networks.

  • 1
  • 351

What to Know Before Choosing a Malware Analysis Environment

Even the Most Advanced Malware Analysis Environment could potentially be Circumvented by a Sufficiently Advanced Attacker. From a technology perspective, it has never been a better time to be in the cyberattack business. Thanks to the common availability of attack tools in the underground marketplace, today’s adversaries don’t require the technical know-how to develop malware.

  • 0
  • 372

Rise of as-a-service lowers bar for cybercriminals

HAs-a-service offerings for things such as DDoS and malware -- including ransomware -- via exploit kits has seriously lowered the bar for entry into the criminal market. Hackers no longer need to have sophisticated skills in order to gain entry into the world of cybercrime. Scott Simkin weighs in.

  • 0
  • 354

Cybersecurity alliance promoting intel-sharing seeks to expand

Hackers have probably had a harder time slipping past your security software, thanks to an alliance between some of the top vendors in the industry. The Cyber Threat Alliance, a group of security firms that often compete, says its efforts to share intelligence on the latest hacking threats have been paying off.

  • 0
  • 357


As high-profile data breaches continue to make news headlines, expectations concerning the security of data continue to rise. Given the trend surrounding new privacy- and cybersecurity-related laws around the world that mandate personal data breach and security incident notification – including the European Union’s General Data Protection Regulation and Network and Information Security Directive, respectively – it’s now critical for organizations, particularly those with global operations, to maintain a level of compliance that combines productivity and data security.

  • 0
  • 206

Obama's Former Cybersecurity Coordinator Named President Of CTA

The Cyber Threat Alliance (CTA) consortium founded by security vendors Fortinet, Intel Security, Palo Alto Networks, and Symantec, today announced that it is now officially a nonprofit trade association and that Michael Daniel, the former cybersecurity coordinator and special assistant to President Barack Obama, will serve as the CTA's first president.

  • 0
  • 374

New products of the week 2.13.17: PAN-OS 8.0

PAN-OS 8.0 adds over 70 features to the Next-Generation Security Platform, enabling customers to safely embrace the cloud; prevent successful cyberattacks with high performance across network, endpoint and cloud environments.

  • 0
  • 369

Palo Alto stresses breakthrough innovation across massive range of new launches

Palo Alto identifies five areas of innovation within a wide-ranging series of announcements, although the most exciting appear to be around the expansion of threat protection capabilities, including credential theft protection.

  • 0
  • 370

IBM, Symantec e Nokia se unem para tornar sistemas IoT mais seguros

Alguns grandes atores dos mercados de Segurança e Internet de Coisas, incluindo a IBM, a Symantec, a Nokia e a At&T estão unindo forças para resolver problemas que tornam a IoT vulnerável em muitas áreas.

  • 0
  • 326

IoT Cybersecurity Alliance Will Collaborate on Standards, Education

A new IoT Cybersecurity Alliance formed by AT&T, IBM, Palo Alto Networks, Symantec, and Trustonic promises to help solve one of the most critical elements of the Internet of Things (IoT) — security. The group says its goal is to work on IoT security standards as well as raise awareness about the topic.

  • 0
  • 312
Displaying 1 to 30 of 1538