Date

By Year

By Type

  • In The News (1292)

By Topic

By Product Category

By Services

By Technologies

By Industry

By Audience

By Language

Displaying 31 to 60 of 1622

Around 5% of All Monero Currently in Circulation Has Been Mined Using Malware

These numbers are the results of in-depth research of the coin-mining malware scene by security researchers from Palo Alto Networks.
  • 0
  • 1264

Study: More than 5 Percent of Monero Cryptocurrency was Mined by Malware

Researchers from Palo Alto Networks have analyzed around 630,000 samples of cryptocurrency mining malware captured by the company’s systems over the past few years and extracted the wallet IDs and mining pools used by attackers.
  • 0
  • 832

Non-JavaScript Cryptojacking Reaps More Than $144M, Researcher Finds

NEWS ANALYSIS: Cryptojacking attacks are finding success and have now gained the attention of the U.S Federal Trade Commission (FTC).
  • 0
  • 831

Monero’s Money Mining Malicious Malware Monopoly

Palo Alto Networks malware researcher Josh Grunzweig has identified a massive 470,000 unique malware samples that hijack computers to mine cryptocurrency.
  • 0
  • 1031

$175 Million in Monero Mined via Malicious Programs: Report

The popularity of crypto-currency malware has been skyrocketing over the past year, and the segment appears to have been highly lucrative for cybercriminals, a new Palo Alto Networks report reveals.
  • 0
  • 1268

Sofacy APT Has Subtly Changed Tactics

A well-known Russian cyber-espionage group has subtly changed its modus operandi, moving to what security researchers from Palo Alto Networks are calling "parallel attacks."
  • 0
  • 1006

Former SoftBank and Google exec Nikesh Arora talks taking over Palo Alto Networks with outgoing CEO

"Mad Money" host Jim Cramer hears from Palo Alto Networks' incoming CEO Nikesh Arora and outgoing CEO Mark McLaughlin as he prepares to step down.
  • 0
  • 1240

Palo Alto Networks to demo third-party apps

At its annual Ignite Conference today, Palo Alto Networks will demonstrate the first third-party apps able to run on its cybersecurity platform, a "proof of concept" for a model that CEO Mark McLaughlin believes is the future of the industry.
  • 0
  • 1052

DHS cyber 'moonshot' group lays out next steps, sets due date for final report

A presidential advisory committee working group plans to submit a report by year's end with “actionable steps” toward a cybersecurity “moonshot,” an ambitious goal meant to create a sustainable approach to the nation's overall cyber challenge, committee members said at a Thursday meeting.
  • 0
  • 1341

Few states seek election security funds

JUST ONE-FIFTH? — A “disconcertingly low” number of states have formally requested election security funds from a $380 million pot Congress set aside for that purpose, Eric reports for Pros today.
  • 0
  • 1175

Cybersecurity ‘Moonshot’ Plan to Head to Trump in November

An advisory group shared broad principles of the moonshot plan, but no details, Thursday.
  • 0
  • 1503

SilverTerrier uses malware to drive BEC attacks

SilverTerrier uses malware to drive BEC attacks
  • 0
  • 968

NEW REGULATION: NIS Directive Will Ensure the UK Remains ‘On’ May 10, 2018

NEW REGULATION: NIS Directive Will Ensure The UK Remains ‘On’ During The Most Extreme Cyber-Attacks
  • 0
  • 1132

European Directive NIS Goes Live Today: Here’s What you Need to Know

NIS has been overshadowed by GDPR. Companies need to comply, fast.
  • 0
  • 1007

Commerce chief Ross to deliver keynote at upcoming DHS cyber 'moonshot' meeting

Commerce chief Ross to deliver keynote at upcoming DHS cyber 'moonshot' meeting
  • 0
  • 1595

NIS Directive comes into force to boost infrastructure cyber-security

The Security of Network Information Systems (NIS) Directive, which aims to ensure that critical infrastructure is protected from cyber-attacks and computer network failure, has come into force today with fines for non-compliance.
  • 0
  • 1021

Nigerian Email Scammer Princes Aren’t a Joke

Nigerian Email Scammer Princes Aren’t A Joke, Stealing Over $3 Billion In 2017
  • 0
  • 955

Nigerian cyber attackers up their game

Nigerian cyber attackers have modernised their approach to cyber crime, security researchers warn
  • 0
  • 1097

Phishing alert: Hacking gang turns to new tactics in malware campaign

Security company warns 'SilverTerrier' group poses a threat to businesses.
  • 0
  • 938

Researchers detect rise in attacks from Nigerian cyber criminals

Researchers detect rise in attacks from Nigerian cyber criminals
  • 0
  • 893

Palo Alto Networks CEO Mark McLaughlin: Security "is a software fight"

Palo Alto Networks CEO Mark McLaughlin: Security "is a software fight"
  • 0
  • 1053

A 'playbook' for every APT

Palo Alto's Ryan Olson on APT playbooks
  • 0
  • 739

Dark Reading: Automation Exacerbates Cybersecurity Skills Gap

Three out of four security pros say the more automated AI products they bring in, the harder it is to find trained staff to run the tools.
  • 0
  • 1515

CSO: RSA roundup: 5 security vendors CISOs need to be aware of

The madness known as the RSA Security Conference took place last week in San Francisco. The event featured somewhere in the neighborhood of 1,000 vendors and over 40,000 users, making it by far the largest security conference.
  • 0
  • 805

SC Media: 'SquirtDanger' Swiss Army Knife malware steals cryptocurrency, takes screenshots

Palo Alto's Unit 42 researchers identified a new botnet malware family described as “Swiss Army Knife Malware” that was designed by a veteran threat actor and is capable of taking screenshots and draining cryptocurrency wallets.
  • 0
  • 786

The Internet Of (SECURE) Things Checklist

In October 2016, as a botnet strung together by the Mirai malware launched the biggest distributed denial-of-service attack in history, I was, appropriately enough, giving a talk on the Internet of Things (IoT) security and privacy at the Grace Hopper Conference. As I learned of the attack, and as questions came in from the audience about the malware, I knew that the topic of my session could not have been more timely. In this instance, and in countless others, IoT security is a core issue. Security professionals need to be concerned about insecure devices.
  • 0
  • 1083

Palo Alto Networks CEO: Consolidation thwarts innovation

Palo Alto Networks CEO: Consolidation thwarts innovation
  • 0
  • 838

5 Ways to Get Ready for Public Cloud Deployment

For many organizations, the public cloud has become the sole route to market for new product introductions. This cloud infrastructure is owned and managed by a third party, freeing up the organization from the maintenance and cost that comes with a private cloud setup. With that, speed and scale are the main reasons why developers are moving to the public cloud, and now is the best time for security teams to tighten their partnerships with product development and IT teams.
  • 0
  • 1281

Palo Alto Networks brings cloud management option, new UI to Traps endpoint protection

Traps has also been better integrated with the Palo Alto Networks Application Framework, something that is likely to please channel partners. So will the increased channel enablement around this Traps release.
  • 0
  • 1115

The CyberWire Daily Podcast

In today's podcast, we hear that AMD continues its investigation of the backdoors and other vulnerabilities CTS Labs publicly disclosed. That disclosure remains controversial. BlackTDS offers malware distribution as-a-service on the black market.
  • 0
  • 1390
Displaying 31 to 60 of 1622