Palo Alto Networks® engaged independent data privacy risk management provider TRUSTe® to review and document the data flows and practices described in this datasheet. The purpose of this document is to provide customers of Palo Alto Networks with information needed to assess the impact of this service on their overall privacy posture by detailing how personal information may be captured, processed and stored by and within the service.


 

SilverTerrier: The Rise of Nigerian Business Email Compromise

Through our analysis, it remains clear that Nigerian cyber actors will continue to expand their attacks in terms of size, scope and capabilities. According to law enforcement organizations, the exposed losses to businesses worldwide from these threat actors are now estimated to be more than US$3 billion. Given the substantial risk these actors pose, we present techniques to enable large-scale attribution efforts to combat this threat. In doing so, we demonstrate a repeatable and sustainable process to identify SilverTerrier infrastructure and put preventive measures in place prior to the first samples of malware reaching our security products.
  • 0
  • 2643

AutoFocus Datasheet

Overview of the AutoFocus threat intelligence service.
Palo Alto Networks,
  • 1
  • 12037

AutoFocus Quick Demo

Watch a short overview video how of the AutoFocus threat intelligence service helps security teams identify and prevent targeted attacks. We will explain the key concepts of AutoFocus and benefits the service provides.
  • 3
  • 5139

AutoFocus At A Glance

The AutoFocus threat intelligence service allows security teams to prioritize their response to unique, targeted attacks. Gain the intelligence, analytics, and context needed to protect your organization. View the At-a-Glance for a high-level view into the AutoFocus service and key use-cases.
Palo Alto Networks,
  • 3
  • 4719

Telkom Indonesia

Telkom Indonesia chose Palo Alto Networks to strengthen the security operations center as the company prepares for global expansion.
  • 1
  • 659

Operation Lotus Blossom

Operation Lotus Blossom describes a persistent cyber espionage campaign against government and military organizations in Southeast Asia. The report exposes the targets, tools, and attack techniques, and provides full details on the Lotus Blossom campaign, including all indicators of compromise. Unit 42 discovered these attacks using the Palo Alto Networks AutoFocus platform, which enables analysts to correlate the results of the hundreds of millions of reports generated by WildFire.
Santa Clara, CA
  • 11
  • 5680