Date

By Source

By Technology

By Services

By Audience

Displaying 1 to 30 of 9721

Unauthorized Coin Mining in the Browser

Unit 42 examines the pervasiveness of unauthorized coin mining inside browsers.

Yuchen ZhouWei XuJun WangWayne Xin,
  • 0
  • 3

LiveWeek 20 Oct 2017

GET ANSWERS Seek and ye shall find Can't find what you're looking for? Helpful information to help you find the documents that may have the information you need more easily!   TRAPS & ENDPOINT Traps 4.1.1 NEW! Traps 4.1.1 has been announced! Hear ye hear ye, Traps 4.1.1 has been announced.

editeur,
  • 0
  • 0

Bitcoin boom prompts growth of coin-mining malware

The booming price of Bitcoin and other crypto-coins has kicked off a gold rush among malicious hackers keen to cash in, warn security firms. Many sites are now harbouring code that secretly uses a visitors' computer to mine the valuable e-cash coins. Palo Alto Networks said it had found Coin-Hive on almost 150 separate domains. The most popular locations for the code were porn, video and file-sharing sites.

  • 0
  • 34

Pattern of network vulnerability scanning coming from all over the world

In the last month or so we have seen lots of network vulnerability scanning for the following 3 Threat IDs coming from all over the world.     - MVPower DVR TV Shell Unauthenticated Command Execution Vulnerability(30426) - WebUI mainfile.php Arbitrary Command Injection Vulnerability(38836) - Wireless IP Camera Pre-Auth Info Leak Vulnerability(33556)   We

Curt_Wilson,
  • 0
  • 0

2 Minute Threat Brief: Browser Cryptocurrency Mining

Get the 2 minute threat brief on cryptocurrency mining.

Eila Shargh,
  • 0
  • 1

Channel Scoop: October 20, 2017

Dig into this week's NextWave Partner Channel Scoop.

Lang Tibbils,
  • 0
  • 0

BadPatch

Unit 42 examines the BadPatch campaign consisting of 4 types of malware and new attack methods.

Tomer BarSimon Conant,
  • 0
  • 0

Making Diversity a Priority: Practical Advice for Achieving a Diverse Cybersecurity Industry

Making diversity a priority: practical advice for achieving a diverse cybersecurity industry.

Cristina Salmastlian,
  • 0
  • 0

Securing Diversity in Cybersecurity

Securing diversity: Danielle Kriz recaps last month’s New America Foundation's panel addressing diversity in cybersecurity.

Danielle Kriz,
  • 0
  • 1

Grace Hopper Event Draws 18,000 to Promote Women in Tech

In the cybersecurity field, where women compose only 11 percent of the workforce, there is a serious shortage of qualified professionals, threatening to hinder the pace and progress of fighting cybercrime. An influx of skilled women would change the equation. To that end, the Grace Hopper Celebration of Women in Computing (GHC) drew more than 18,000 attendees, when it took place...

Security Roundtable Staff,
  • 0
  • 2

Meet the 2017 Live Community Sentinels - Remo Mittler

About the Sentinel Program  

carnould,
  • 0
  • 0

NEW! Traps 4.1.1 has been announced!

If you use Traps 4.1 and macOS High Sierra, Microsoft Office or Windows, then the following information is going to be very important to know about.  There have been many enhancements (fixes) that have been included in the latest version of Traps 4.1.1.   You can find all of the

jdelio,
  • 0
  • 0

Will GlobalProtect client protect against WPA2 KRACK'd network?

Will the GP VPN client provide encryption for WPA2 sessions comprimised by the recent KRACK method?   Does that cover all the OS varients - Win, Mac, IoS, android?   I realize that only covers traffic routed back to the firewall.

NeilR,
  • 0
  • 2

Cybersecurity Leadership Role A Sweet Spot for the CISO

Cybersecurity has traditionally been a subject only a few executives were expected to understand. However, as additional security concerns are spreading across businesses, cybersecurity now concerns all members of the C-Suite. For example: The chief financial officer needs to ensure secure transactions between financial institutions or business partners. The chief marketing officer needs to master how to securely leverage digital...

Shinichi Yokohama,
  • 0
  • 2

‘Poor Cyber Hygiene’: Three Dirty Words for Online Retailers

Breakdowns in routine cyber hygiene have resulted in several recent security breaches at online retailers. CISOs, CIOs, and board members are, therefore, coming to understand that basic infrastructure and security protocols must be upheld to protect the business from cyber criminals and threats. Basic hygiene includes understanding where the most valuable assets reside, deprovisioning legacy assets, configuring the system with...

Erin Nealy Cox,
  • 0
  • 3

Federal Ignite 2017 – A New Era for Federal Cybersecurity

Join Palo Alto Networks for our inaugural Federal Ignite conference in Washington D.C.

Jennifer Martinez,
  • 0
  • 1

Palo Alto Networks Recognized in Fortune Future 50

Palo Alto Networks has been recognized in Fortune’s Future 50 list, the world's forward-looking innovative companies that are best set up for the future.

Mark McLaughlin,
  • 0
  • 3

Can't find what you're looking for?

I'm sorry you can't find what you're looking for.  Need a problem solved but not sure how to proceed, like Brainy down here?   I frequently misplace stuff, and sometimes even lose things. I don't know why exactly, seeing that I'm a bit scatter-brained and disorganized myself but, for some reason,

kiwi,
  • 0
  • 0

Minemmeld access error : EDL external dynamic list file either empty or not found

I am getting the follwoing error repetedly in PAN-OS 8.0.5   > tail mp-log ms.log 2017-10-18 21:14:53.743 -0700 Error: ebl_verify_fetched_copy(pan_cfg_ebl.c:2241): EDL entry(0x1068000, 0x1e760800, 0x12cb6000 vsys1/EDl-IP, 0, 1 ip) Old refreshed file type is either not a text file or empty file or no old file exist. 2017-10-18 21:14:53.743 -0700 Error:

ausafali88,
  • 0
  • 0

Telkom Indonesia Strengthens Security Operations Center in Preparation of Global Expansion with Palo Alto Networks Next-Generation Firewall

SANTA CLARA, Calif. – October 19, 2017 – Palo Alto Networks® (NYSE: PANW), the next-generation security company, today announced that Telkom Indonesia —Indonesia’s state-owned telecommunications and network service provider – selected the Palo Alto Networks Next-Generation Security Platform to ensure it has a secure base from which to move forward with its global expansion.

SANTA CLARA
  • 0
  • 57

How The Next-Generation Security Platform Contributes to GDPR Compliance

Cybersecurity is an essential investment to protect personal data and comply with the GDPR. The vast majority of GDPR requirements center around data management, namely data collecting and processing.

  • 0
  • 60

Tcp flood

Hi, today from 15.10 to 16.10 I received more than 15600 calls from the same IP. The Windows 2012 server already has a function against SYN ATTACK and TCP FLOOD, and I see it on the tcp-rst-from-server log monitor, but they are very small compared to those aged-out. It's been

s_quasar,
  • 0
  • 3

EDUCAUSE 2017: Learn How to Prevent Successful Cyberattacks

Meet up with Palo Alto Networks experts at EDUCAUSE 2017, October 31-November 4 in Philadelphia, PA.

Monique Vandamme-Wildt,
  • 0
  • 1

Threat Brief: Drive-by Mining – Adapting an Old Attack to Mine Cryptocurrencies

Get the Unit 42 threat brief on a drive-by mining technique that adapts an old attack method to mine cryptocurrencies.

Christopher Budd,
  • 0
  • 0

Traps Prevents Microsoft Office Zero-Day

Traps prevents recently patched Microsoft Office Zero-day vulnerability.

Maor Dokhanian,
  • 0
  • 3

IoT Security Best Practices

It’s no secret that IoT security is a problem. That’s why there are so many regulations and initiatives aimed at fixing the issue. But even with the right measures in place, networking professionals still need to be careful how they deploy IoT. To those ends, a number of best practices have been published to guide IoT deployments. Here’s a run down...

  • 0
  • 6

New Worry For CEOs: A Career-Ending Cyberattack

Cyber threats have zoomed to the top of chief executives’ worry lists for fear a data breach could cost them their jobs and take down their businesses. The fallout of attacks on companies from Target Corp. to Yahoo Inc. and, most recently, Equifax Inc. has thrust more corporate bosses to the front line of cybersecurity issues and changed the way...

  • 0
  • 5

Protect Workloads in the Hybrid Cloud

Public cloud infrastructure-as-a-service (IaaS) or Platform-as-a-service (PaaS) offerings, such as Amazon Web Services, Microsoft Azure or Google Cloud Platform, can quickly and economically accommodate unexpected or temporary business computing workloads. Many aviation organizations are extending their private data centers to the public cloud for a hybrid cloud model for competitive and operational benefits. In the aviation industry, concerns over data, workloads, siloed legacy systems, processes, infrastructure security and latency are still a major concern. Regardless of where data resides, is ultimately the target of malicious entities. Learn how Palo Alto Networks is taking care of this challenge

  • 0
  • 2

Your Board Of Directors Is Exposing You To Risk

It’s commonly accepted that your users are the weakest link in your security chain. That is actually not true in a lot of cases, though. The reality is that your true Achilles heel is probably your board of directors. Rick Howard, chief security officer of Palo Alto Networks, pointed out that board members, on the other hand, are not employees and generally operate completely outside the scope and protection of your information security tools and policies—using personal computers and mobile devices.

  • 0
  • 67

FedIgnite 2017 is just around the corner!

Literally if you are in Washington DC!   What is it? Leading government, cybersecurity, and industry professionals will gather together on October 23 and 24, 2017 for an interactive conversation on next-generation threat prevention at the Palo Alto Networks Federal Ignite 2017.   When: Monday October 23 and Tuesday October

carnould,
  • 0
  • 1
Displaying 1 to 30 of 9721