Unit 42 has recently identified malware exploiting an attack technique we have named “BackStab,” in which attackers can capture private information from backup files stored on a Windows PC or Macintosh. Under default conditions, iOS devices plugged into a computer running iTunes may create an unencrypted backup file that contains many types of private information. Forensics experts have known about these backups for years and have used them to capture phone data without requiring direct access to the phone. We have found that malicious attackers are now using malware to steal data using this same technique.

 


 

Product Summary Specsheet

Key features, performance capacities and specifications for all Palo Alto Networks firewalls.
  • 80
  • 216749

Palo Alto Networks Support Services Datasheet

Overview of service and support options available to you.
  • 6
  • 16878

Actionable Threat Intelligence

This document explores and highlights the capabilities of Palo Alto Networks network security management solution, and its ability to make critical information visible and actionable.
  • 25
  • 13011

Security Lifecycle Review

Security Lifecycle Review
  • 2
  • 4665

Palo Alto Networks and Aruba Networks

Aruba Networks and Palo Alto Networks have partnered to provide best of class content security for guest and employee owned mobile devices that are now commonplace on enterprise networks. With the certified solution, enterprise IT departments can now securely enable Bring Your Own Device and Guest Access initiatives, while maintaining compliance. Aruba’s Wi-Fi network and Palo Alto Networks’ next-generation firewalls share user, device and application information to monitor and enforce application usage policies on smartphones, tablets and laptops.
  • 0
  • 5740

Application Usage and Threat Report

The AUTR provides visibility into the real-world threat and application landscape, helping security teams to understand how adversaries are attempting to attack organizations around the world and build proactive, actionable controls. Built by the Unit 42 threat research team, the report correlates data from more than 7,000 enterprise organizations, providing broad visibility into critical trends.
Santa Clara
  • 29
  • 8600