Date

By Source

By Technology

By Services

By Audience

Displaying 1 to 30 of 9944

Palo Alto Networks to Present at Upcoming Investor Conferences

Palo Alto Networks® (NYSE: PANW), the next-generation security company, today announced that members of its management team will be presenting at the following financial community events: 2017...

Santa Clara, CA
  • 0
  • 8

North Korean Hackers Target Android Users in South

At least two cybersecurity firms have noticed that the notorious Lazarus threat group, which many experts have linked to North Korea, has been using a new piece of Android malware to target smartphone users in South Korea.

  • 0
  • 29

Tech Docs: The VM-Series Firewall is the Next Link in Your OpenStack Service Chain

Tech Docs: discover why the VM-Series Firewall is the next link in your OpenStack service chain.

David Montgomery,
  • 0
  • 1

Does Your Cyber Defense Strategy Pay Heed to Patterns?

As a CISO, I have participated in many discussions about breaches. We do our best to understand who the attackers are, what exploits they use, and how they compromise systems. During this analysis, however, we often overlook patterns that might show up between different breaches. Headlines grab our attention, we look empathetically, leaning in, counting our blessings that our company...

Paul Calatayud,
  • 0
  • 2

Using Existing Malware to Save You Time

Unit 42 demonstrates how using existing malware can enhance research efforts.

Mike Harbison,
  • 0
  • 0

Operation Blockbuster Goes Mobile

Operation Blockbuster goes mobile: Unit 42 identifies cluster of malware samples targeting Samsung devices and Korean language speakers.

Anthony KaszaJuan CortesMicah Yates,
  • 0
  • 1

HP Intelligent Management Center TFTP Server DATA and ERROR Packets Buffer Overflow (35688)

Good Day, everyone needing some help with a threat id number I can not find any information on.    I am needing to do so research on this threat ID that is showing in the Palo Alto once in a while.  I am wanting to change security profile setting from

AdamCoombs,
  • 0
  • 1

Palo Alto Networks Reports Fiscal First Quarter 2018 Financial Results

Palo Alto Networks® (NYSE: PANW), the next-generation security company, today announced financial results for its fiscal first quarter 2018 ended October 31, 2017. Total revenue for the fiscal...

Santa Clara, CA
  • 0
  • 166

Cyberpedia: What is it and why should you care?

When I was young, the only place that I could go to learn more information was inside an encyclopedia and that was inside a library. But now with soo much information at our fingertips, where do security professionals go to get a better understanding of  security concepts that are being added

jdelio,
  • 0
  • 0

Which method of Phishing Credential Prevention?

We are currently using User-ID to map users to IP addresses.  It seems that there are three possible methods of preventing credentials from leaving a site, but I am not clear on which method is best.  What are other folks doing?  One of the methods involves spinning up a RODC,

brucegarlock,
  • 0
  • 1

LiveWeek 17 November 2017

Great new and updated articles this week in AWS and Azure, cloud services, management and learning -- let's get right to it!    AWS/AZURE NEW!! Self-Inflicted AWS Auto-Scaling Failures In AWS, the auto scaling process can fail for multiple reasons. Check out some self-inflicted causes for auto-scaling failures in AWS. We

editeur,
  • 0
  • 1

Pro active monitoring for routing table

Hello,   We have faced problem where routing table is full and we had an outage where customer were unable to access Internet for specific sites.   We asked for syslog or SNMP traps on it but we received as of now, there is no provision to monitor it.  

GOC_Virtela,
  • 0
  • 2

File minemeld-web.conf doesn`t exist

I`m looking for file minemeld-web.conf  into /etc/nginx/sites-available/minemeld-web.conf  directory but it doesnt exist, there`s only default file.   I need to change HTTPS services to HTTP   I installed the super fast setup from the site https://live.paloaltonetworks.com/t5/MineMeld-Articles/Running-MineMeld-on-VMWare-desktop/ta-p/72038   Greetings

vhgambit,
  • 0
  • 0

Engine error after reboot

My Minemeld system is failing to start, giving an engine error. The last it,e in the log is   2017-11-18T17:38:06 (2843)launcher._run_chassis ERROR: Exception in chassis main procedure Traceback (most recent call last): File "/opt/minemeld/engine/0.9.44/local/lib/python2.7/site-packages/minemeld/run/launcher.py", line 53, in _run_chassis c.configure(fts) File "/opt/minemeld/engine/0.9.44/local/lib/python2.7/site-packages/minemeld/chassis.py", line 102, in configure config=ftconfig.get('config', {}) File "/opt/minemeld/engine/0.9.44/local/lib/python2.7/site-packages/minemeld/ft/__init__.py", line

deanm,
  • 0
  • 1

Logs Retention on MineMeld

Hello,   I want to change the log retention on MineMeld. It looks that the default configuration is 7 days. I was not able to find where to change this parameter. Can you please help?

alyssonalmeida,
  • 0
  • 1

Not all SSL traffic is being decrypted

I configured the firewall to decrypt outbound SSL traffic and installed a local cert I created onto my broswer. When I monitor my port 443 traffic I see some of  it is decrypted and some of it isnt. Is this normal behavior? I thought it was suppose to decrypt all

wrainwater,
  • 0
  • 9

Ignite 2017 Open Seats: Compliance Best Practices for DevOps

To get you ready for the premier security conference of the year, we’ll be spotlighting our top session each day on the blog.

Anna Lough,
  • 0
  • 0

Make ‘Cyber Prep’ A Part of Doing Business

You’d think that the last thing any company would want, when it has suffered a disruptive data breach, is to compound the problem. So why are so many companies doing just that, with sub-par cyber-incident response? One of the main reasons is that many are still treating cyber risk as a technology issue, when it is actually a business issue....

Sean Duca,
  • 0
  • 2

Channel Scoop: November 17, 2017

Dig into this week's NextWave Partner Channel Scoop.

Lang Tibbils,
  • 0
  • 1

PA-5200 Series Datasheet

Key features, performance capacities and specifications for our PA-5200 Series.

  • 3
  • 39165

How to block a specific file with hash value?

Hi Guys, I am using a pair of PA820 with TP, URL Scan and WF. I received a list of hash values from my Authority but couldn't find any hits on VirusTotal. Without doubting my big boss, I wanted to manually block it in the firewall but could not find

BEASG-IT,
  • 0
  • 3

Middle East 'MuddyWater' Attacks Difficult to Clear Up

Long-lasting targeted attacks aimed at entities in the Middle East are difficult to attribute despite being analyzed by several researchers, Palo Alto Networks said this week. Dubbed “MuddyWater” by the security firm because of the high level of confusion they have already created, the attacks took place between February and October 2017. The campaign has made use of a variety of malicious documents, and hit targets in Saudi Arabia, Iraq, Israel, United Arab Emirates, Georgia, India, Pakistan, Turkey, and the United States to date

  • 0
  • 60

MineMeld - Office 365 - How can I disable miners?

I am working on Office 365 control and I have discovered that MineMeld seems to be the best way to do this.  To that end, I have set up a MineMeld server and imported the PAN-provided script for Office 365.   There are some Office 365 features that we do

scottsander,
  • 0
  • 1

Self-Inflicted AWS Auto Scaling Failures

In AWS, the auto scaling process can fail for multiple reasons. Sometimes the cause for failure can actually be self inflicted. In this article, we will discuss some self-inflicted causes for auto-scaling failures in AWS. We will also discuss how to avoid these self-inflicted failures by following a few simple

jperry1,
  • 0
  • 1

Guest Post: Doing Multifactor Authentication the PCI Way

Guest post by David Mundhenk and Ben Rothke on doing multifactor authentication the PCI way.

David MundhenkBen Rothke,
  • 0
  • 0

2018 Predictions & Recommendations: Cyber Hygiene for Financial Institutions Found Non-Compliant with SWIFT Mandatory Security Controls

2018 predictions & recommendations: cyber hygiene for financial institutions found non-compliant with SWIFT mandatory security controls.

Lawrence Chin,
  • 0
  • 4

A Rocket Scientist Hacks the Cybersecurity Labor Crisis

You don’t have to be a rocket scientist to fill jobs. But it takes one to figure out how the world will fill its 3.5 million cybersecurity jobs that are predicted to be open by 2021. Sylvia Acevedo, a former rocket scientist for the NASA Jet Propulsion Laboratory in Pasadena, California — and now CEO of Girl Scouts of the United States...

  • 0
  • 5

Creating a lab to test ICS/SCADA protocols

Introduction Organizations with industrial control systems (ICS) have been on a path to secure the border between IT (corporate network) and OT (ICS network) for some time. The first step for many was to provide simple segmentation between the two networks using firewalls from Palo Alto Networks. This satisfied initial

kwall00,
  • 0
  • 0

Feed from Soltra Edge Feed

Hello,    I am having some trouble pulling a feed from a Soltra Edge (NH-ISAC) into a local minemeld instance and I am not entirely sure how to go about troubleshooting it since the visibile errors with the minemeld console are a unfamiliar to me.    Based on what I've

David.Heath,
  • 0
  • 0

Bridging the Miles: 1,000 Special Ops Teddy Bears En Route to U.S. Military Active Duty Families

Palo Alto Networks volunteers help assemble 1,000 special ops teddy bears to U.S. military active duty families.

Adrienne Alesandro,
  • 0
  • 0
Displaying 1 to 30 of 9944