Researchers from Palo Alto Networks have analyzed around 630,000 samples of cryptocurrency mining malware captured by the company’s systems over the past few years and extracted the wallet IDs and mining pools used by attackers.
At its annual Ignite Conference today, Palo Alto Networks will demonstrate the first third-party apps able to run on its cybersecurity platform, a "proof of concept" for a model that CEO Mark McLaughlin believes is the future of the industry.
A presidential advisory committee working group plans to submit a report by year's end with “actionable steps” toward a cybersecurity “moonshot,” an ambitious goal meant to create a sustainable approach to the nation's overall cyber challenge, committee members said at a Thursday meeting.
The Security of Network Information Systems (NIS) Directive, which aims to ensure that critical infrastructure is protected from cyber-attacks and computer network failure, has come into force today with fines for non-compliance.
The madness known as the RSA Security Conference took place last week in San Francisco. The event featured somewhere in the neighborhood of 1,000 vendors and over 40,000 users, making it by far the largest security conference.
Palo Alto's Unit 42 researchers identified a new botnet malware family described as “Swiss Army Knife Malware” that was designed by a veteran threat actor and is capable of taking screenshots and draining cryptocurrency wallets.
In October 2016, as a botnet strung together by the Mirai malware launched the biggest distributed denial-of-service attack in history, I was, appropriately enough, giving a talk on the Internet of Things (IoT) security and privacy at the Grace Hopper Conference. As I learned of the attack, and as questions came in from the audience about the malware, I knew that the topic of my session could not have been more timely. In this instance, and in countless others, IoT security is a core issue. Security professionals need to be concerned about insecure devices.
For many organizations, the public cloud has become the sole route to market for new product introductions. This cloud infrastructure is owned and managed by a third party, freeing up the organization from the maintenance and cost that comes with a private cloud setup. With that, speed and scale are the main reasons why developers are moving to the public cloud, and now is the best time for security teams to tighten their partnerships with product development and IT teams.
Traps has also been better integrated with the Palo Alto Networks Application Framework, something that is likely to please channel partners. So will the increased channel enablement around this Traps release.
In today's podcast, we hear that AMD continues its investigation of the backdoors and other vulnerabilities CTS Labs publicly disclosed. That disclosure remains controversial. BlackTDS offers malware distribution as-a-service on the black market.