Brad Duncan is back with a new Wireshark tutorial. This one examines a recent infection of Qakbot (AKA Qbot), which is an information stealer, so security pros can better understand its traffic patterns for detecting and investigating in the future.
Stay Up to Date on Your Upgrade ProcessWe recently announced Cortex XDR™ 2.0, a significant advancement that unifies Traps™ endpoint protection and Cortex XDR into one platform for unrivaled security and operational efficiency.
SCADA and Industrial Control Systems experience unprecedented levels of agility, speed, and cost savings with the adoption of information technology and increased connectivity to supporting networks.
However, with this modernization have also come undesired IT vulnerabilities and other threat vectors which are increasingly being exploited by malicious actors.
The need for improved security in ICS has never been higher and has become a board-level issue for many organizations.
In this paper Mario Chiock, Cybersecurity & Disruptive Technology Executive Adviser and Del Rodillas Senior Manager, SCADA and Industrial Controls Cybersecurity go through the nine core capabilities that define this 21st century security platform for industrial control systems.
As you may be aware, there’s money to be made on the internet. The question, of course, is how. Not everyone has the reality-distortion skills to start their own tech unicorn, or the Stanford connections to become an early employee there, or the indifference to sunlight necessary to become a world-class Fortnite gamer.
A spear-phishing campaign targeted a U.S. government agency for several months last year using emails with content about North Korea geopolitics as a lure, according to an analysis from Palo Alto Networks' Unit 42.
This post is based on additional findings from the Unit 42 Cloud Threat Report which shows how misconfigured Docker registries could leak confidential data, lead to a full-scale compromise, and interrupt the business operations.
Provides an overview of how Palo Alto Networks solutions for the SOC use artificial intelligence and machine learning to find important security events without generating low-value alerts that require analyst time, attention, and manual remediation.
Highly skilled attackers can break into the most well-protected organizations. They can trick users, compromise hosts and devise other under-handed schemes to infiltrate targeted networks. Your mission is to find these adversaries and root them out fast--before the damage is done.
App-ID increases the value of our next-generation firewalls by making it easier and faster to determine the exact identity of applications traversing the network, enabling teams to set and enforce the right policies. Join Palo Alto Networks experts and learn how you can use the New Policy Optimizer capability to migrate your legacy rule set to App-ID based rules.
Cloud data protection is the practice of protecting and securing all of a company’s data in a cloud environment, regardless of where that data is located, whether it’s at rest or in motion, or if it’s managed internally by the company or externally by a third party.