Date

By Source

By Technology

By Services

By Audience

Displaying 1 to 30 of 11115

Tick Group Weaponized Secure USB Drives to Target Air-Gapped Critical Systems

Recently, Palo Alto Networks Unit 42 discovered the Tick group targeted a specific type of secure USB drive created by a South Korean defense company
Kaoru HayashiMike Harbison,
  • 0
  • 0

Channel Scoop: June 22, 2018

Get the latest partner news in this week's NextWave Partner Channel Scoop
Roxanne Edwards,
  • 0
  • 0

Palo Alto Networks Commitment to Educating European CEOs and Boards on Cybersecurity as a Business Issue

Learn how Palo Alto Networks is contributing to the growing emphasis on cybersecurity awareness and skills in the EU
Danielle Kriz,
  • 0
  • 1

Security Operating Platform for Financial Services

Read this white paper for a concise summary of our prevention-based approach to protecting financial institutions from cyberattacks. It describes what we do, how we do it differently, and provides an overview of use cases commonly implemented by financial institutions with our security platform.
  • 0
  • 1

Network Based Security for the IoT Value Chain

Read how Read how Palo Alto Networks protects service provider networks, IoT systems, and interconnected networks while providing new revenue opportunities to operators.
  • 0
  • 2

False Positive Submission (generic.ml)

  Hi, Kindly check MyCleanID from RealDefense LLC   VirusTotal link:   https://www.virustotal.com/#/file/a2215b22423aaac6cb1e0c43cf4f62e097ef9c7be33acef620736385eefb4056/detection Current VT Verdict: generic.ml     Thank you.
kns123,
  • 0
  • 0

Unable to pull policies from a firewall managed by Panorama

I am running latest version 1.0.91. I have a user at both Panorama and the firewall with the API key that is associated with Expedition. Panorama holds all of the config, but I am unable to pull it from either the firewall or Panorama. The devices are added fine, they
PAN-Expert,
  • 0
  • 0

New Magnifier June 2018 Features

Welcome to Magnifier! Magnifier is a cloud service that runs in the Palo Alto Networks Application Framework. It automatically detects and reports on post-intrusion threats by identifying good (normal) behavior on your network, so that it can notice bad (anomalous) behavior.   These are the new features that came out
kiwi,
  • 0
  • 0

Don’t Panic About Software Supply Chain Attacks

This episode of the Don't Panic Unit 42 podcast examines software supply chain attacks.
Christopher Budd,
  • 0
  • 0

warning on the nat rulebase

hey i have warnings on some of the nat rules the warning is : "NAT RulseID[4] is using an address [192.168.152.50] that is not defined in my databse action: "adding to the DB"   i have an object with this IP on the objects list   how do i fix
minow,
  • 0
  • 3

Merging 2 ASA configurations into 1

I have a task to migrate a policy from 2 ASA firewalls into 1. Haven't seen policies yet but i think it's like 2 seperate entities. Anyone had similar project? How did you aproach it? My only idea so far is use Expedition for the more complex config and manually
santonic,
  • 0
  • 1

Build Consistent Security Throughout NFV Evolution

Download the use case for more information on NFV
  • 0
  • 8

False Positive Submission (generic.ml)

Hello, Reporting False Positive Software name: Identity Theft Preventer  SHA256: 4593ca4e913867ffd80d4a24355f9a75afda1bdd94fb9a5e55e837aedd062318 MD5: 31dccb4323b88f66c8a7e2b5e4e211fe Website with download link: https://shieldapps.com/products/identity-theft-preventer/ Thank you for your time
JJShield,
  • 0
  • 0

Lightboard Series: Protection Against Phishing and Malicious Sites

Safely enable web access while providing protection against malware or phishing sites is of the utmost importance to organizations today.
  • 0
  • 15

Error configuring Palo Alto Networks firewall with AWS longer resource IDs

Symptoms When configuring an IPsec VPN between AWS Virtual Private Gateway and a Palo Alto Networks device. using the configuration generated by AWS for Palo Alto Networks as Vender. From AWS portal by Go to "VPC > VPN Connections" and then select "Download Configuration" If the VPN gateway is using
melamin,
  • 0
  • 0

Greenfield ML Video - alternative other than use syslog

Hello there,   I saw the video for ML - the features looks nice, however I am wonderinf is there are other alternatives other than send info via syslog or scp (as in video). I will like just to export it manually since I have my VM on my laptop
Edwardo,
  • 0
  • 0

Unable to upgrade Expedition (current version is 1.0.84) nor best practice tool

Hello there,   I downloaded the VM from the Palo Alto live portal. I am unable to run the best practice tool (version 2.11). Reading the posts, I saw that it is recommended to upgrade to latest version. Hoever, I am unable to do so:     Reading package lists...
Edwardo,
  • 0
  • 0

Detailed Documentation

Does anyone know if there are any plans on releasing detailed documentation for MineMeld? Specifically, I am looking for documentation on writting my own prototypes. I know that can can use existing ones as templates, but I would like to see documentation for all of the prototype settings that are
Jon_Irish,
  • 0
  • 1

error when adding device

When adding a device I receive an empty error message in the UI as shown below   In the Apache error.log I see the following message appear:   PHP Fatal error:  Uncaught PDOException: SQLSTATE[42S22]: Column not found: 1054 Unknown column 'avoidToday' in 'field list' in /var/www/html/libs/vendor/doctrine/dbal/lib/Doctrine/DBAL/Driver/PDOConnection.php:77\nStack trace:\n#0 /var/www/html/libs/vendor/doctrine/dbal/lib/Doctrine/DBAL/Driver/PDOConnection.php(77): PDO->prepare('insert into
JohanBogema,
  • 0
  • 0

Install MineMeld from sourcecode

Hello, Is there any way to fully deploy minemeld from the source code?  
alyssonalmeida,
  • 0
  • 0

retreive base config using the api

hey   i added a new pa820 device to the devices section and have added the credentials for the api then when i click on the "contents" tab "retrive contents" it states that is downloading but this state is not chaning to "downloaded" as in the admi guide.    where
minow,
  • 0
  • 0

The Old and New: Current Trends in Web-based Threats

Unit 42 investigates the latest trends in web-based threats.
Tao YanBo QuZhanglin HeRongbo Shao,
  • 0
  • 1

3 New NextWave Partner Program Updates

3 Important updates for Palo Alto Networks NextWave partners
Lang Tibbils,
  • 0
  • 0

FALSE positive (generic.ml)

File Hash: 127259300f4786c1f615be658d236aa875a9dc20fc0be4b5f9cdc637ba058622 Link to Virustotal report for the file: https://www.virustotal.com/#/file/127259300f4786c1f615be658d236aa875a9dc20fc0be4b5f9cdc637ba058622/ Current VirustTotal Verdict: generic.ml Description: This exe has been built by ourself, we are the publisher of the file. We are sure this is a false positive detection.  
HS-Brelo,
  • 0
  • 0

Secuirty/NAT Polcies appear in XML but not set command file

Hello,   Has anyone else ran into the occourance where the set commands (specfically for secuirty policies) are missing? The Secuirty/NAT policies are indeed in the XML. When I try to go ahead an regernate the XML and set output I get an error saying "aborted".    
NDelgaudio,
  • 0
  • 0

Expedition Azure or AWS build

Hey Everyone,   Looking to get Expedition in Azure specifically.  I see details on creating an ovf, but looking for steps for building this in Azure.   I know that MS has a converted for OVF also, but am worried about double conversions.   Any help is appreciated and Thanks!
Jmarx1,
  • 0
  • 0

Terraform Provider Version 1.2.0 Released

Terraform Provider Version 1.2.0   The Palo Alto Networks Terraform provider, panos version 1.2.0 has been released! This release includes some requested enhancements as well as some new resources.   The updated documentation for the panos provider can be found here.   Features   New Resource: panos_telemetry New Resource: panos_security_policy_group [GH-20]
gfreeman,
  • 0
  • 2

CISOs Must Incorporate Regional Laws and Regulations into Cyber Strategy

Why it's important for CISOs to incorporate regional laws into cyber strategy.
Chad Berndtson,
  • 0
  • 2

Phishing more popular than ever!

Phishing: the attempt to obtain sensitive information (such as usernames, passwords, and credit card information, etc.), by presenting oneself as a trustworthy entity.   Between January and March of 2018, Unit 42 has uncovered over 4000 URLs from over 250 domains used in phishing attacks. Over half of these domains
kiwi,
  • 0
  • 0

Palo Alto Networks Extends Global Cyber Range Initiative With Newest Facility in Sydney

SYDNEY, Australia, 19 June 2018 – Palo Alto Networks® (NYSE: PANW), the global cybersecurity leader, today announced the opening of its Sydney Cyber Range as the newest facility in its global Cyber Range initiative.
Sydney, Australia
  • 0
  • 157
Displaying 1 to 30 of 11115