Date

By Year

By Type

  • In The News (1216)

By Topic

  • Cybersecurity (107)

By Product Category

By Services

By Technologies

By Industry

By Audience

  • Business (1226)

By Language

Displaying 31 to 60 of 1488

Palo Alto Networks seeks new security model with $20M venture fund

Cybersecurity company Palo Alto Networks has announced it is forming a $20 million security venture fund to provide early stage capital investments for development of innovative security applications for its Next-Generation Security Platform.

  • 0
  • 414

Girl Scouts add merit badges for cybersecurity

Forget archery and horseback riding. The Girl Scouts are adding a series of new merit badges in cybersecurity. Working with Palo Alto Networks, the Scouts are developing the curriculum now, with a goal toward offering the first badge by September 2018.

  • 0
  • 394

5 Hot Happenings From Palo Alto Networks Ignite 2017

Palo Alto Networks looked to up its security game across the board at its Ignite 2017 event in Vancouver, Canada, this week, rolling out new technology products, partnerships and venture capital investments.

  • 0
  • 516

Palo Alto Networks Expands Security Platform With New Application Framework, GlobalProtect Offerings

Palo Alto Networks is vastly expanding its security platform with the launch of a new Application Framework and cloud-based services, the company announced Tuesday.

  • 0
  • 383

Palo Alto Networks Launches New Venture Fund, Looks To Build Security Platform Ecosystem

Palo Alto Networks is looking to boost the next-generation of security startups, announcing the launch of a new venture fund on Tuesday to further expand the company's platform with new, innovative technology.

  • 0
  • 385

The CyberWire Daily Podcast for 05.19.17

Palo Alto Networks Rick Howard discusses research on Shamoon, adversary playbooks, and credential theft.

  • 0
  • 539

How CISOs can answer difficult questions from CEOs

The CEO puts all the trust in the chief security officer to keep the company off the front page and out of danger. But as the number of attacks across the internet skyrockets, that trust has slowly eroded or at the very least is increasingly questioned.

  • 0
  • 568

President Trump signs cybersecurity executive order

President Trump signed a long-awaited executive order on Thursday designed to improve the nation's cybersecurity.

  • 0
  • 907

Nemucod delivering credential-stealing trojan, Palo Alto

Researchers at Palo Alto Networks have spent the past five months examining a malware campaign that uses the Nemucod downloader to ultimately deliver a trojan that siphons out credentials, according to a post on the company blog.

  • 0
  • 611

Palo Alto springs Traps endpoint protection on ransomware

Several key enhancements were released today for Traps – the endpoint security tool offered by Palo Alto Networks. The new capabilities strengthen the malware and exploit prevention capabilities of Traps and extend support to more operating systems, including macOS and Android (beta).

  • 0
  • 325

Women in cybersecurity need to take more risks

Rinki Sethi, director of information security at Palo Alto Networks, needed to bring a lot of confidence and skills to the gates of cybersecurity when she began her career.

  • 0
  • 619

Palo Alto lança novos recursos para o Traps

A Palo Alto Networks, fornecedora de soluções de segurança corporativa, lançou recursos adicionais ao Traps, solução de proteção para endpoint. As novas ferramentas reforçam a prevenção contra malware e exploit, além de ampliar o suporte para outros sistemas operacionais, incluindo macOS e Android (beta).

  • 0
  • 287

Malware Analysis Done Right

The reality facing the cybersecurity industry today is as soon as network defenders develop a new way to spot malware, cyberadversaries are quick to find a way to circumvent it. With the number of cyberattackers growing every day, the time elapsed between deploying a protection and a bad actor finding a way around it grows ever shorter.

  • 0
  • 708

Roubo de credenciais é o oxigênio que alimenta ataques bem-sucedidos

As senhas são as clássicas necessidades do ambiente virtual e, quando combinadas com nomes de usuários, formam as credenciais. Quase toda atividade online exige a criação de credenciais, seja para contas de e-mail, contas bancárias, acesso a redes corporativas, redes sociais, jogos, serviços de streaming, ou qualquer registro online.

  • 0
  • 278

The CyberWire Daily Podcast for 05.04.17

Rick Howard from Palo Alto Networks previews the Cyber Canon awards ceremony.

  • 0
  • 589

Credential theft is the oxygen that fuels successful attacks

As senhas são as clássicas necessidades do ambiente virtual e, quando combinadas com nomes de usuários, formam as credenciais. Quase toda atividade online exige a criação de credenciais, seja para contas de e-mail, contas bancárias, acesso a redes corporativas, redes sociais, jogos, serviços de streaming, ou qualquer registro online.

  • 0
  • 591

Malware for video devices is able to erase data

Os pesquisadores da Unit 42, unidade de pesquisa da Palo Alto Networks, identificaram um novo malware para IoT chamado Amnesia. O malware é uma variação do botnet Tsunami e mira vulnerabilidades de execução de códigos remotos presentes em dispositivos DRV (gravadores de vídeos digitais) fabricados por cerca de 70 empresas no mundo.

  • 0
  • 623

Malware Para Dispositivos De Vídeo É Capaz De Apagar Dados

Os pesquisadores da Unit 42, unidade de pesquisa da Palo Alto Networks, identificaram um novo malware para IoT chamado Amnesia. O malware é uma variação do botnet Tsunami e mira vulnerabilidades de execução de códigos remotos presentes em dispositivos DRV (gravadores de vídeos digitais) fabricados por cerca de 70 empresas no mundo. Com base nas análises de dados, a vulnerabilidade afeta aproximadamente 227 mil dispositivos no mundo.

  • 0
  • 272

Palo Alto Networks Identifies Malware for IoT

Os pesquisadores da Unit 42 Palo Alto Networks identificaram um novo malware para IoT chamado Amnesia, que é uma variação do botnet Tsunami.

  • 0
  • 556

The CyberWire Daily Podcast for 04.27.17

Palo Alto Networks Rick Howard outlines a new white paper on credential theft.

  • 0
  • 544

Cardinal RAT Remained Hidden for Two Years

A recently discovered remote access Trojan (RAT) that abuses Excel macros in an innovative way has been active for more than two years, Palo Alto Networks security researchers reveal. Dubbed Cardinal RAT, the malware had a very low volume over the two-year timeframe, with only 27 total samples found to date.

  • 0
  • 536

Cardinal RAT reigns under the radar two years

Palo Alto Networks researchers spotted a previously unknown remote access trojan (RAT) dubbed the Cardinal RAT which uses a unique technique involving malicious Excel macros.

  • 0
  • 647

The CyberWire Daily Podcast for 04.17.17

Rick Howard from Palo Alto Networks ponders the first principle of automotive security.

  • 0
  • 507

Securing the Government Cloud

Cloud service deployments at the federal, state and city levels that benefit from the cloud's operational and cost efficiencies have been unprecedented. The federal government launched its Federal Risk and Authorization Management Program, or FedRAMP, to certify a consistent way for cloud service providers to offer security assessment, authorizations and continuous monitoring to government organizations. State and city governments rely on third-party contractors to assess cloud providers for them.

  • 0
  • 767

Credential Theft: The Key to Shamoon 2 Data Destruction

The problem of stolen credentials is a well-known threat in the security industry. But knowing something is a problem and understanding the full scope are two different things. The Shamoon 2 attacks targeting critical organizations across Saudi Arabia should serve as a clear demonstration about how significant the problem of credential theft is and how taking steps to prevent it can yield truly significant, tangible results in protecting against attacks.

  • 0
  • 798

Malware for IoT begins to show destructive behavior

Hackers começaram a adicionar rotinas de limpeza de dados em malwares que são feitos para infectar aparelhos embutidos e de Internet das Coisas (IoT). Dois ataques observados recentemente mostram esse comportamento, mas provavelmente para objetivos diferentes.

  • 0
  • 506

IoT Botnet "Amnesia" Hijacks DVRs via Unpatched Flaw

A new Linux/IoT botnet named “Amnesia” has been targeting digital video recorders (DVRs) by exploiting an unpatched remote code execution vulnerability disclosed more than one year ago. The threat, believed to be a variant of the Tsunami botnet, has been analyzed in detail by researchers at Palo Alto Networks. The botnet targets embedded systems, particularly DVRs made by China-based TVT Digital, which are sold under more than 70 brands worldwide.

  • 0
  • 836

The CyberWire Daily Podcast for 04.06.17

Palo Alto Networks Rick Howard describes the cloud paradigm shift.

  • 0
  • 507

Introducing the Cybesecurity Canon

For those that want more, there’s the Cybersecurity Canon project, of which I’m a member. Canon members include industry experts such as Christina Ayiotis, co-chair of the Georgetown Cybersecurity Law Institute, Dawn-Marie Hutchinson of Optiv, Brian Kelly CISO at Quinnipiac University and more.

  • 0
  • 832
Displaying 31 to 60 of 1488