Date

By Source

By Technology

By Services

By Audience

Displaying 1 to 30 of 10493

Risk Management: Who’s Responsible? Who’s Accountable?

This incident really happened. The CISO of a global food company shut down a production plant on his own volition. The board was about to fire him, until he explained his thinking: The company’s recipe was two chemicals away from producing poison—and adversaries had obtained a copy of said recipe. What would have happened if the CISO had not discovered...

Security Roundtable Staff,
  • 0
  • 0

Data Never Sleeps

Data is on overdrive. It’s being generated at break-neck pace, flooding out of the dozens of connected devices we use every day, and it shows no signs of slowing down. In fact, the number of internet users has grown over a billion in the last five years, more than half of the world’s web traffic now comes from mobile phones....

  • 0
  • 0

Palo Alto Networks Recognized for Assisted Technical Support Excellence by J.D. Power and TSIA for 3rd Consecutive Year

J.D. Power and TSIA, the Technology Services Industry Association, have recognized Palo Alto Networks for providing our customers with an “Outstanding Customer Service Experience” for Assisted Technical Support for a third consecutive year.

Scott Ciccone,
  • 0
  • 0

False Positive Removal Request

Hello! We have checked our software on VirusTotal and see false positive detection (generic.ml). Please check the protected zip file with two executable modules : https://www.dropbox.com/s/ctnzdf50s3e0yxb/PALOALTO-FALSE-POSITIVE.zip?dl=0 Archive also contains two VirusTotal reports. Password for zip file is “false” (without quotes). Best Regards. CTL+ Développement Gérard Chauvineau

CTLPLUS,
  • 0
  • 4

How does PA identity an application as "Threat"

Hello guys,   We have an application - "sina-weibo-base" is allowed to be accessed for internet access policy, but when user access to it, PA block it and the "Session End Reason" is "Threat".   Does this mean PA consider this application a threat?   Thanks    

qd_056,
  • 0
  • 0

Minemeld Installation on RHEL 7.4

Dear Team,   I have successfully installed minemeld on RHEL 7.4 and Am able to access the web console from Local Machine but am not able to access from Network.     Please help if anyone faced the same issue.   Thanks and Regards, Ramprasath  

Nocturnalknight,
  • 0
  • 0

Watchdog PC Cleaner being flagged as False Positive

We make Watchdog PC Cleaner.   This is where you can download the file for Watchdog PC Cleaner in the VirusTotal report below that you are blocking.   https://www.watchdogdevelopment.com/en/download/pc-cleaner   You classified this file as generic.ml threat.   https://www.virustotal.com/#/file/5851c0ad8577eb07ea8418a8702e31ac546b662f369fc530863068a1411d4c8d/detection   MD5:  6336043049ec687d0fd234a4beae6dbf SHA-1:  9aa368721b75832281ce98c811a1811df5f3f0e0 SHA-256:  5851c0ad8577eb07ea8418a8702e31ac546b662f369fc530863068a1411d4c8d   Authentihash:  314872eb1a46cb3b9abe2cb643f70709f8794a3315e4b0bb972c65d84e22dd36 Imphash: 

WatchdogDevelopmenLLC,
  • 0
  • 1

Know Your Cyber Attacks: Five Common Exploits

When two major security flaws located in the microprocessors driving most of the world’s computers became public earlier this year, it was big news. Those vulnerabilities—Spectre and Meltdown—could enable hackers to access the entire memories of most PCs, mobile devices, and servers in use. Although the specific techniques that cyber-adversaries deploy against their targets and the openings they take advantage...

Stephanie Overby,
  • 0
  • 7

Announcing PAN-OS 8.1: Streamline SSL Decryption, Accelerate Adoption of Security Best Practices

Learn about PAN-OS 8.1, the latest version of the software that powers our next-generation firewalls.

Navneet SinghStephanie Johnson,
  • 0
  • 28

ランサムウェア Saturn vs Traps

パロアルトネットワークスは、ランサムウェア Saturn の検体を入手し、Traps で検証を実施し、防御可能なことを確認しています。本記事では、技術検証した結果のみを記載します。   【ランサムウェア Saturnに感染時の端末画面】 ランサムウェア Saturnに感染すると下記のようにファイルが暗号化され、ポップアップメッセージが表示されます。暗号化されたファイルは「.saturn」の拡張子となります。 感染後に表示されるポップアップメッセージ1感染後に表示されるポップアップメッセージ2暗号化されたファイル   【Trapsの検知画面】 TrapsエージェントがWildFireの脅威情報を取得できない状態(例:ネットワーク未接続状態)においても、 機械学習による静的解析エンジンによりSaturnの起動を阻止することができました。 もちろん、ネットワークに接続されていれば、世界中でリアルタイム解析&共有されたWildFireの脅威情報を利用した検知が可能です。   TrapsのWildFire連携や静的解析エンジンのセキュリティ機能をあえて無効にして、今回入手したSaturnの動作を見てみました。その場合、Trapsは下記の2つの検知を行っています。   ・疑わしいプロセス制御機能(子プロセス制御)の検知  →バックアップから復元できないように、ボリュームシャドウコピーを消す動作をTrapsが検知 ・おとりファイルを利用した、ランサムウェア起動後のファイルの暗号化処理を阻止  →ランサムウェアは実行されてしまったが、実ファイルを暗号化されずに保護することが可能   【子プロセス制御での検知ログ】 静的解析でブロックしたログは以前のBadrabbitと同様のログになりますので割愛しますが、本記事では子プロセス制御の検知についてのログについて解説します。 このSaturnの検体においては、cmd.exeからvssadminを呼び出し、delete shadows /all /quiteコマンドにてボリュームシャドウコピーを削除することにより、バックアップから復元できないようにしている動作をTrapsが疑わしいと見なして検知し、その動作を実行前に阻止していることが確認できます。   ▼検証環境 Windows 7 32bit Traps 4.1.2 Content Update 33-2266   ■検体ハッシュ値  (SHA-256) b3040fe60ac44083ef54e0c5414135dcec3d8282f7e1662e03d24cc18e258a9c  

tmuroi,
  • 0
  • 0

Lightboard Series: PA-3200 Series

  • 0
  • 38

Lightboard Series: PA-220R

  • 0
  • 50

10 Things To Test In Your Future NGFW: Prevent Credential Theft

Users and their credentials are among the weakest links in an organization’s security infrastructure. As such, the majority of breaches involve credential theft at some point in the attack lifecycle. With credential abuse as part of the attackers’ toolset, their chances of successfully breaching go up, and their risk of getting caught goes down.

  • 0
  • 26

What is Cloud Computing?

Cloud-based computing is the delivery of hosted cloud services over the internet, and providers of cloud services maintain the necessary infrastructure to support it. Hosted cloud services include constant online access to servers, networking, software applications, databases and data storage.

  • 0
  • 9

Machine Learning in Cybersecurity

In computing, machine learning is the ability of a system to learn without being programmed to do so. In machine learning algorithms, computers and other machines analyze data using automated robots and make predictions based on pattern recognition.

  • 0
  • 20

Remote Access for ICS and SCADA

White paper discussing how remote access can be supplied to both greenfield or brownfield deployments into an automation network

  • 1
  • 89

Defining the 21st Century Cybersecurity Protection Platform for ICS

In this paper Mario Chiock, Cybersecurity & Disruptive Technology Executive Adviser and Del Rodillas Senior Manager, SCADA and Industrial Controls Cybersecurity go through the nine core capabilities that define this 21st century security platform for industrial control systems.

  • 2
  • 3987

PA-220R

Palo Alto Networks ® PA-220R ruggedized appliance brings next-generation capabilities to industrial applications in harsh environments.

  • 0
  • 3615

Industrial Control Systems

The Security Reference Blueprint for Industrial Control Systems (ICS) enables operators to become compliant with both government and internal governance.

  • 1
  • 1394

PA-3200 Series

Palo Alto Networks® PA-3200 Series of next-generation firewalls comprises the PA-3260, PA-3250 and PA-3220, all of which are targeted at high-speed internet gateway deployments.

  • 0
  • 4193

Applying VLAN Insertion in ICS/SCADA

Case studies on the Target® and recent Ukraine electrical grid attacks indicate that these attacks were containable or preventable with proper network segmentation.

  • 0
  • 429

PA-5200 Series Datasheet

Key features, performance capacities and specifications for our PA-5200 Series.

  • 5
  • 51687

Palo Alto Networks Adds to Its Next-Generation Firewall Lineup With New Hardware That Speeds Decryption and Improves Performance

Palo Alto Networks® (NYSE: PANW), the next-generation security company, today announced new hardware and updates to its PAN-OS® operating system that further enable organizations to easily...

Santa Clara, CA
  • 0
  • 1177

Palo Alto Networks Secures Networks in Harsh Industrial Environments With New PA-220R Next-Generation Firewall

Palo Alto Networks® (NYSE: PANW), the next-generation security company, today announced the introduction of its ruggedized PA-220R next-generation firewall. This new NGFW appliance is designed to...

Santa Clara, CA
  • 0
  • 109

MineMeld not loading after installation

After succesfol installation of MineMeld in a Debian9, by using this article: https://github.com/PaloAltoNetworks/minemeld-ansible   When accessing to HTTPS://IP_Address it stays forever loading (showing the loading "M"). I can't see any error in the logs, services are fine.   Any ideas?

MarcelST,
  • 0
  • 0

WildFire

Palo Alto Networks WildFire cloud-based threat analysis service is the most advanced analysis and prevention engine zero-day exploits and malware.

  • 6
  • 20375

Introducing the Ruggedized PA-220R Next-Generation Firewall

Learn more about the PA-220R and our approach to helping our users safely modernize their OT

Del Rodillas,
  • 0
  • 1

Davos 2018: Hot Topics in Cyber Risk

From SecurityRoundtable.org contributor Greg Day: With more world leaders attending, and a large fall of snow, the atmosphere and the village were even more intense this year than my first year at the World Economic Forum meeting in Davos. During the week, I was most fortunate to meet lots of amazing people, from academics and business leaders to politicians.   I...

  • 0
  • 1

Magnifier Behavioral Analytics

Download the datasheet to learn the key features and benefits of Magnifier Behavioral Analytics, the first application for the Palo Alto Networks Application Framework.

  • 2
  • 2253
Displaying 1 to 30 of 10493