Displaying 1 to 30 of 86

‘Shift left’ prevents missteps that lead to 90% of breaches in cloud computing

Lugging workloads from on-premises to public cloud is straining when done with flimsy security policies.
  • 0
  • 290

Fine-Tuning the Security Operations Center

Kerry Matre of Palo Alto Networks Describes How to Structure a Nimble SOC
  • 0

The Cybersecurity 202: Trump is getting tough on Chinese hacking. Will it work?

The Trump administration is prepping a slate of get-tough measures against Chinese government-linked hackers — including indictments, a naming and shaming campaign by multiple federal agencies and possible sanctions against hackers and the organizations that back them.
  • 0
  • 458

49% of Cloud Databases Left Unencrypted

Businesses also leave information vulnerable in the cloud by failing to implement MFA and configure Kubernetes settings, new research reveals.
  • 0
  • 416

Palo Alto Networks to provide new 5G-ready firewall security product

Cybersecurity researchers have detected new spearphishing and malicious-email campaigns associated with two Russian-government-linked hacking groups known for breaching the Democratic National Committee in 2016.
  • 1
  • 523

Palo Alto Networks to launch next-gen firewall for 5G networks

5G networks will bring more speed, less latency and probably more security headaches. Enter Palo Alto Networks, which will court carriers who will be on the hook for securing 5G.
  • 1
  • 481

RUSSIA'S ELITE HACKERS MAY HAVE NEW PHISHING TRICKS

A MAJOR QUESTION hanging over the United States midterm election season: Where was Russia?
  • 0
  • 485

Researchers uncover new malware activity by Russian hackers

Researchers have attributed new malware activity targeting governments in several countries to a Russian hacking group.
  • 0
  • 454

Russian APT activity is resurgent, researchers say

Cybersecurity researchers have detected new spearphishing and malicious-email campaigns associated with two Russian-government-linked hacking groups known for breaching the Democratic National Committee in 2016.
  • 0
  • 414

Russian hacking tool gets extra stealthy to target US, European computers

This malicious software will email your hacker from your computer without you ever knowing.
  • 0
  • 450

What’s next for DHS cyber changeup

What’s next for DHS cyber changeup
  • 0
  • 460

Fake Adobe Flash Installers Come With a Little Malware Bonus

A recent scourge of fake Adobe installers really does provide an update to the latest version of Flash.
  • 0
  • 613

Fake Adobe Flash Updates Hide Malicious Crypto Miners

A fake Adobe update actually updates victims’ Flash – but also installs malicious cryptomining malware.
  • 0
  • 661

Cryptomining malware discovered masquerading as Flash updates

This malware is so sneaky it updates your Flash to look legit.
  • 0
  • 631

A flood of fake installers will really update Flash for you – but also install cryptocurrency mining malware

If you think that Flash, the once-popular web plugin, couldn’t die fast enough, even those annoying fake Flash installers riddled with malware aren’t going anywhere any time soon. In fact, they’re getting even sneakier.
  • 0
  • 685

New Mirai variant attacks Apache Struts vulnerability

New variants of the Gafgyt and Mirai botnets are targeting unpatched enterprise devices, which indicates a greater shift away from consumer devices, according to researchers.
  • 0
  • 907

Iron Group suspected in creation of Xbash all-in-one malware

A threat actor has been targeting Windows and Linux servers with a self-propagating malware mash-up that’s comprised of botnet, ransomware, disk wiper, cryptomining and worm elements all in one.
  • 0
  • 906

A well-known hacking group is getting better at evading detection

A well-known hacking group remains highly active with new incursions against Middle Eastern governments, according to a new report from U.S. cybersecurity firm Palo Alto Networks. Additionally, the group is employing evasion techniques meant to cut down on the risk of detection.
  • 0
  • 807

New OilRig APT campaign leverages a new variant of the OopsIE Trojan

The Iran-linked APT group OilRig was recently observed using a new variant of the OopsIE Trojan that implements news evasion capabilities.
  • 0
  • 817

USA Is the Top Country for Hosting Malicious Domains According to Report

The US continues to be the top country hosting domains that serves web-based threats and the main source for exploit kit distribution at a global level, according to new research.
  • 0
  • 802

Palo Alto Networks expands Google partnership to leverage Google Cloud AI capabilities

As part of the enhanced relationship with Google, Palo Alto Networks will now run their Application Framework and GlobalProtect cloud service in the Google Cloud, as they believe its analytics capabilities are the best fit for these applications.
  • 0
  • 258

The daily briefing

Today's regular daily summary starts here.
  • 0
  • 1422

DarkHydrus Uses Open Source Phishery Tool in Middle-East Attacks

Today's regular daily summary starts here.
  • 0
  • 1287

FBI struggles to keep top cyber talent

FBI’S CYBER RETENTION WOES
  • 0
  • 1218

Hacking group combines spear-phishing with mass malware campaign

Pakistani hacking group uses basic techniques and has poor operational security - but appears to have slithered into a large number of networks.
  • 0
  • 1090

Worst of both words: 'Gorgon' hackers practice both general cybercrime and targeted government attacks

A hacking group apparently based in Pakistan has been straddling the fence between cybercriminal activity and nation-state espionage, leveraging the same malicious infrastructure to both launch email spam campaigns and target government agencies in U.S., UK, Russia and Spain
  • 0
  • 1048

Android apps infected with umm… *Windows* malware

145 ANDROID APPS YANKED FROM OFFICIAL GOOGLE PLAY STORE.
  • 0
  • 1175

Android Apps Infected With Windows Keylogger Removed From Google Play Store

Google has removed 145 Android apps infected with Windows malware from the official Play Store after a report from security researchers at Palo Alto Networks.
  • 0
  • 1079

Tick Group Malware Campaign Highlights Need for Stronger Supply Chain Security

Security researchers recently observed a malware campaign that leverages a particular type of USB drive to target specific Windows machines.
  • 0
  • 1238

Mirai, Gafgyt IoT Botnet Attacks Intensify

Security researchers are warning of a new wave of attacks associated with two infamous Internet of Things (IoT) botnets: Mirai and Gafgyt.
  • 0
  • 1113
Displaying 1 to 30 of 86