As recent headlines illustrate, malicious actors are improving their ability to compromise organizations with increasing usage of automated tools to scaletheir attacks. The malware distribution mechanism that malicious actors are coming to rely on in order to generate profits from their activity, like holding files for ransom or stealing information for resale, are exploit kits. Exploit kits are server-based frameworks that automate the exploitation of vulnerabilities on target machines, most commonly while victims are browsing the web. While an increasingly urgent challenge, exploit kits can be thwarted with the right security technology and risk management processes. Unit 42, the Palo Alto Networks® threat intelligence team, recently released an in-depth report on exploit kit history, evolution and effective defenses.

 


 

What is a denial of service attack (DoS) ?

A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users by flooding it with traffic.
  • 2
  • 54864

What is an Intrusion Prevention System?

An Intrusion Prevention System (IPS) is a network security prevention technology that examines network traffic flow to detect and prevent vulnerability exploits
  • 4
  • 105753

Product Summary Specsheet

Key features, performance capacities and specifications for all Palo Alto Networks firewalls.
  • 85
  • 234671

What is a Zero Trust Architecture?

Businesses who want to prevent the exfiltration of sensitive data and improve their defense against modern cyber threats can consider a Zero Trust architecture.
  • 1
  • 37356

What is Cybersecurity?

Cybersecurity refers to the preventative techniques used to protect the integrity of networks, programs and data from attack, damage, or unauthorized access.
  • 4
  • 80111

PA-5200 Series Datasheet

Palo Alto Networks® PA-5200 Series of next-generation firewall appliances is comprised of the PA-5280, PA-5260, PA-5250 and PA-5220.
  • 21
  • 86935