Download the use case handbook to learn about the major security challenges, threats and vulnerabilities found in mobile networks and how the Palo Alto Networks approach can benefit mobile network operators.
Hi, I would like to draw urgent attention of Paloalto Networks staff to resolve following false-positive on one of Comodo Internet Security files: File SHA-1: aa98566f8b3f254dc8fb3678b0e3b983270310fe Link to Virustotal report for the file: https://www.virustotal.com/en/file/f80c084dc4747b8fee70ac4028e9b734cbc8aa3aea230b24fa9740da44ffcec1/analysis/1503271961/ Current VirustTotal Verdict: generic.ml Description: This file, guard64.dll, is part of Comodo Internet Security, which
APERTURE GOES MFA @jdelio If you are using a static username and password to log in to Aperture, soon you'll need to take action to log in to Aperture. In an effort to further strengthen your security posture, Aperture will support multi-factor authentication (MFA) for all administrator log-ins starting Thursday, August
Hello all, I am currently receiving error messages on two miners within minemeld regarding the "Last Run" while trying to pull and carve out new IoCs. The message I get when hovering over the error is "500 Server Error: Internal Server Error " Can anyone advise as to how
I would like to set up a new Miner to collect the Public IP addresses for the Microsoft Windows Notification Service (WNS). The list is available as a downloadable xml file but I haven't been able to find a feed. Does anyone know whether it is possible to get the
A good CISO always looks for ways to increase the skills of staff – in fact, it’s a necessity given the constantly changing threat landscape. One way to flex the muscles of the threat hunting team might be to take a look at a blog this week from Jeff White of Palo Alto Networks’ Unit 42 threat intelligence team, who writes about how he investigated another in a long series of PowerShell attacks.
Live Community members are able to view this announcement in the discussion forum as well. Dear valued Palo Alto Networks customers, If you are using a static username and password to log in to Aperture, please read the following update carefully: In an effort to further strengthen
SANTA CLARA, Calif. – August 16, 2017 – Palo Alto Networks® (NYSE: PANW), the next-generation security company, today announced that Domain Group — one of Australia’s leading multi-platform property media and marketing companies — selected the Palo Alto Networks Next-Generation Security Platform to protect vital media assets and prevent network breaches in its private cloud.
Hi MT is a great tool - but I have one enhancement feature request: To be able to refine existing rule - for example if you have a source of /24 - and you know that it is only being used by a few hosts. If there was a
Email/phishing attacks are a major concern at healthcare organizations with Austria, Germany, Netherlands, Switzerland, United States, and Nordic countries all listing it as the greatest area of vulnerability
U.S. respondents feel the most prepared to stop cyber-attacks on the network, and least prepared to stop cyber-attacks on unmanaged endpoints
Endpoint and medical devices protection are top of mind with 72.1% stating that deploying effective advance endpoint protection to stop malware like ransomware, 38% are looking for effective exploit kit protection for endpoints and 54% are looking for medical devices protection.
U.S. hospitals report being attacked by cybercriminals (89.5%) nearly two times more frequently than the next nearest country (Germany – 46.0%) over the last 12 months
I have created an output node based on the autofocus.indicatorStoreOutput prototype. I pointed an aggregator at it and logs show it is accepting indicators. However, it seems I am unable to Enable the node. The node is listed as Enabled in the 'Config' tab and has been committed but it
Great info from the Palo Alto Networks Product Management Team on the latest events surrounding DNSChanger. DNSChanger is a malware family that has been around for several years now, and at its height controlled the web browsing of some 4 million PCs. DNSChanger typically masqueraded as a video codec download, and once downloaded would surreptitiously change the DNS servers of the infected host to rogue DNS servers which direct users to pay-per-click advertising networks to earn money for the perpetrators.
Hackers with believed ties to the North Korean government have taken to targeting defense contractors working with the United States government, according to security researchers.
Network and enterprise security company Palo Alto Networks released new research Monday that suggested Lazarus Group, a collective of hackers who are often linked to North Korea, are behind a number of cyber attacks aimed at defense industry companies.
According to a blog post by Palo Alto Networks' Unit 42 division, this newly discovered campaign uses the same infrastructure, tools, tactics, and files that were employed in the 2014 Sony Pictures hack, as well as a recent campaign, detailed in April, that targeted Korean-speaking individuals.
Greetings, I have looked at several documents and cannot seem to find what the memory, disk space and any other pre-requisits that are required for the Paloalto migration tool. Thank you for your assistance,
In effort to understand the processing of the Microsoft Office 365 MS O365 Dynamic IP addresses/Urls of Endpoints Url (see MS url below) by the MineMeld application, where is the configuration file with this MS Office 365 url stored for the Minemeld application? https://support.content.office.net/en-us/static/O365IPAddresses.xml The Minemeld YAML configuration