Displaying 61 - 77 of 77
Research Reports
Credential-Based Attacks Research
Credential-Based Attacks: Exposing the Ecosystem and Motives Behind Credential Phishing, Theft and Abuse
In this white paper, Unit 42 details the ecosystem behind how adversaries steal and leverage legitimate credentials to break in and move laterally within the organization, often bypassing security controls. Learn the key attack methods currently in use, how this technique fits into attacker playbooks, and real-world guidance on preventing successful attacks.
Santa Clara
Research Reports
SILVERTERRIER: The Next Evolution in Nigerian Cybercrime
Unit 42 tracks Nigerian Threat Actors and finds they've evolved into capable and formidable adversaries successfully attacking major companies and governments.
Article
Cybercrime: The Underground Economy (Article)
This brief discusses the allocation and use of the cybercrime goods and services.
References and Case Studies
Delta Holding
Delta Holding eliminated ransomware and gained a comprehensive shield against malware and zero-day attacks with Palo Alto Networks Next-Gen Security Platform.
Article
Ransomware: Common Attack Methods (Article)
This brief discusses the common attack methods for delivering ransomware to enable you to focus your security controls on the areas most likely to be leveraged and reduce the risk of infection.
Video
Safely Enable SaaS
Prisma SaaS delivers a unique approach to securing sanctioned SaaS applications. Prisma SaaS provides complete visibly across all user, folder and file activity within the SaaS application providing detailed analysis and analytics on usage to prevent data risk and compliance violations. Even more importantly, it allows granular context-aware policy control within these SaaS applications to drive enforcement and quarantine of users and data as soon as a violation occurs.
Whitepaper
Security Considerations for Private vs. Public Clouds
The cloud movement presents a rare and momentous opportunity to revisit not only how we think about computing, but also how we think about information security. This whitepaper, written by the Cloud Security Alliance, provides an in-depth discussion of the security considerations for public and private clouds. Topics include business agreements, physical and virtual attack surfaces and most importantly, where do the security responsibilities lie.
Research Reports
419 Evolution
In the past three months Palo Alto Networks has identified a series of attacks emanating from Nigerian actors against our customers in Taiwan and South Korea. Our team is tracking this activity under the code name Silver Spaniel. These attacks have deployed commodity tools that can be purchased for small fees on underground forums and deployed by any individual with a laptop and an e-mail address. Read the report by Palo Alto Networks Unit 42.
Video
Application Visibility and Control
How Palo Alto Networks delivers application visibility and control more effectively than other port-based offerings.
Resource
5G 安全是什么?
5G promises transformative mobility by offering a refined mobile broadband experience and enabling the mass digitization of businesses and industries.
3 分钟阅读
Resource
什麼是 5G 安全性?
5G promises transformative mobility by offering a refined mobile broadband experience and enabling the mass digitization of businesses and industries.
3 分鐘閱讀
Resource
¿Qué es la seguridad 5G?
5G promises transformative mobility by offering a refined mobile broadband experience and enabling the mass digitization of businesses and industries.
Lectura de 3 minutos
Resource
Was ist 5G-Sicherheit?
5G verspricht revolutionäre Neuerungen für die Mobilität, indem es das mobile Breitband verbessert und die massive Digitalisierung von Unternehmen und Branchen ermöglicht.
Lesedauer:3 Minuten
Resource
5G 보안이란?
5G promises transformative mobility by offering a refined mobile broadband experience and enabling the mass digitization of businesses and industries.
3분 읽기
Resource
Qu'est-ce que la sécurité 5G ?
La 5G apporte avec elle la promesse d'une toute nouvelle expérience mobile haut-débit et d'une numérisation accélérée de tous les pans de l'économie.
3minutes de lecture
Resource
O que é segurança 5G?
5G promises transformative mobility by offering a refined mobile broadband experience and enabling the mass digitization of businesses and industries.
3min. de leitura
Resource
¿Qué es la seguridad 5G?
Las redes y servicios 5G prometen una movilidad transformadora gracias a que ofrecen una experiencia de banda ancha móvil mejorada y permiten la digitalización masiva de empresas y sectores.
Tiempo de lectura:3 minutos
Displaying 61 - 77 of 77