Date

By Source

By Technology

By Services

By Audience

Displaying 1 to 30 of 10045

Chasing the Dream: Women in Cybersecurity Across Asia-Pacific and Beyond

Chasing the dream: Mihoko Matsubara on the importance of women in cybersecurity across Asia-Pacific and beyond.

Mihoko Matsubara,
  • 0
  • 0

Tech Docs: The Twelve Joys of Aperture!

The gift of security, the gift of protection, the gift of peace of mind. Protect the data in your SaaS applications with these gifts from Aperture.

Paulia Watkins,
  • 0
  • 0

2018 Predictions & Recommendations: The Internet of Things Blurs the Line Between Personal and Corporate Security

2018 predictions and recommendations: the internet of things blurs the line between personal and corporate security.

Paul Calatayud,
  • 0
  • 1

The Ransomware Plague Is Just Beginning

It’s not exactly a no-brainer, but the success of ransomware in 2017 leads us to a logical prediction that more successful ransomware attacks will continue to plague organizations in 2018. These attacks will increase both in volume and sophistication, which will make it even more challenging for security vendors of yesteryear to prevent these attacks and fulfill their basic promise...

  • 0
  • 1

is there a Stix Taxii service offering by Palo Alto

am new to palo alto, read about Minemeld service a while ago. i understood i need to install minemeld to gather the intelligence but in my case i cannot get another service/instance running in the organization.   can some one tel me if PA has a stix taxii server (open

s3kindia,
  • 0
  • 1

False Positive Submission (generic.ml)

Our game is being detected as a false positive.   File Hash: 205406bf1216f77873cf91111ae4d0eea739cf3e1f2ad142db7e581016529d86   Please see ....   https://www.virustotal.com/#/file/205406bf1216f77873cf91111ae4d0eea739cf3e1f2ad142db7e581016529d86/detection   .. for more details.   I am developer.   Thankyou.

My64K-Developer,
  • 0
  • 1

OilRig Performs Tests on the TwoFace Webshell

Unit 42 continues to its look into OilRig with analysis on recent TwoFace Webshell testing activities.

Robert Falcone,
  • 0
  • 6

Is Your Enterprise Ready for a Cloud-First Strategy?

Has your organization adopted a “cloud-first” strategy? Should it? Whether it has or has not, it is vital that board members and senior management understand the challenges, risks, and opportunities. According to “A Repeatable Cloud-First Deployment Process Model,” a white paper from Palo Alto Networks (Security Roundtable’s parent company), here are the key issues you should understand: What is cloud-first?...

Security Roundtable Staff,
  • 0
  • 1

Analysis of CVE-2017-11882 Exploit in the Wild

Unit 42 analyses multiple instances of threat actors exploiting critical vulnerability CVE-2017-11882.

Yanhui JiaTaojie WangZhibin Zhang,
  • 0
  • 7

Ignite ’18: Register Now for $400 Off Unparalleled Security Knowledge

Save $400 on Ignite ’18 Security Conference passes if you register by January 6.

Anna Lough,
  • 0
  • 2

Unauthorized Coin Mining in the Browser

Unit 42 examines the pervasiveness of unauthorized coin mining inside browsers.

Yuchen ZhouWei XuJun WangWayne Xin,
  • 0
  • 21

8 Cybersecurity Trends to Watch for 2018

As we stand on the threshold of another year, the war for our cybersecurity rages on. There have been many data breaches in 2017, most notably for Equifax, Verizon, and Kmart. But if you seek a silver lining in the cloud, perhaps you’ll be glad of the news that the global average cost of a data breach is down 10...

  • 0
  • 15

How to make a passive miner

How would one create a miner that listenes for data instead of actively retrieve it ? (For example a miner that serves a rest endpoint so another application can send data to it)

KristianGa,
  • 0
  • 4

5 Ways Endpoint Security and Network Security Should Work Together

This brief discusses the five things an endpoint security solution should do to prevent negatively impacting your network security posture.

  • 2
  • 96

Intergrading Minemeld into McAfee ESM SIEM

My name is john , i am quite new to Minemeld but i am also using McAfee ESM . can anyone teach me step by step , on how i can intergradeMinemeld into SIEM ? i hope to hearfrom you guys  soon. with regards, John

john_chua,
  • 0
  • 2

LiveWeek 8 Dec 2017

NEW!! DISCUSSION OF THE WEEK (DOTW) DotW: Autolock  Several admins making changes at the same time can result in half-completed adjustments getting committed to an active device. This happens more than you might expect, but there is a solution!   NEW!! UNIT 42  UBoatRAT targets East Asia A new variant

editeur,
  • 0
  • 0

Minemeld PA syslog processing

Hi,   I installed Minemeld. I'm now trying to mine the PA traffic logs via syslog. It seems that the processing works but no indicators are extracted? The PA is running 7.1.13 and sending the syslog messages on TCP port 13514 to the Minemeld server. I already looked into the

jorisVD,
  • 0
  • 1

Channels Scoop: December 8, 2017

Dig into this week's NextWave Partner Channel Scoop.

Roxanne Edwards,
  • 0
  • 1

Cyber Soldiers: White-Hat Hackers

Since 2015, almost all healthcare organizations have reported at least one cyberattack. The largest U.S. hospital attacked in the U.S. 2017 was Erie County Medical Center in Buffalo, New York, and they’re still feeling the effects. Dr. Jennifer Pugh runs their emergency room and she was on staff the morning the hackers infiltrated their system, sending a ransomware note demanding...

  • 0
  • 3

Threat Brief: Unauthorized Coin Mining – A New Threat Facing Shoppers and Retailers This Holiday Season

Threat Brief: unauthorized coin mining – a new threat facing shoppers and retailers this holiday season.

Christopher Budd,
  • 0
  • 8

Accelerating Security Innovation: Introducing the Palo Alto Networks Application Framework

Accelerating security innovation: introducing the Palo Alto Networks application framework.

Scott Simkin,
  • 0
  • 13

The Twelve Joys of Aperture

1. Gmail (Beta) You can now add Gmail for business to the Aperture service. The service applies policy and performs deep content inspection of Gmail messages and attachments to detect zero-day attacks, malware, and data exfiltration so you can view more information about the incident and decide if the activity

pwatkins,
  • 0
  • 0

Building a Scalable GlobalProtect Deployment

Protect your mobile workforce and network from internet-borne threats with a scalable GlobalProtect deployment.

  • 0
  • 379

False tickets serve as bait to contaminate PCs with viruses

The security company Palo Alto Networks announced on Thursday (7) an alert about a coup that circulates in Brazil using fake tickets. In a criminal campaign monitored by the company, more than 260,000 emails have been sent since June 2017. Whoever falls in the coup and tries to open the tickets ends up having the computer infected with a digital plague that steals information, including passwords.

  • 0
  • 6

CRN's 2017 Products Of The Year

Recent updates as part of Palo Alto Networks' PAN-OS 8.0 adds upgrades across cloud security, multi-method threat prevention, management at scale, credential threat prevention, and integrations with complementary vendors.

  • 0
  • 34

Spam campaign uses fake tickets to infect PCs of Brazilians with malware

Using fake tickets to distribute malware, criminals can steal data from victims' computers, including passwords and usernames; called "Boleto Mestre", about 261,098 e-mails have already been distributed since June

  • 0
  • 7

Spam campaign uses fake tickets to infect PCs of Brazilians with malware

Unit 42, the Palo Alto Networks research unit, has identified a malspam (malicious spam) campaign specially developed to affect Brazilian victims. Using fake tickets to distribute malware, criminals can steal data from victims' computers, including passwords and usernames.

  • 0
  • 9

Talos Blacklist

I am trying to create a miner/processor/output nodes for the talos black list ( https://talosintelligence.com/documents/ip-blacklist ) and am failing. Has anyone got this to work?

Hal_Blum,
  • 0
  • 4

Protocol Protection Layer 2 or Vwire

My question would it be important to add protocol protection  in Zone Protection if you are running layer 2 or vwire on you palo alto fiewalll? and if so should it be placed  on untrust or trust or both?

AndyYerger,
  • 0
  • 3

Connecting PAN-OS to MineMeld using External Dynamic Lists

One of the most common use cases for MineMeld is generating feeds to be used on PAN-OS as External Dynamic Lists. Using the MineMeld powerful engine, you can create External Dynamic Lists to track on AutoFocus the IP addresses, URLs and domains used by ransomware, known APT groups and active malware campaigns.

lmori,
  • 0
  • 2
Displaying 1 to 30 of 10045