Date

By Source

By Technology

By Services

By Audience

Displaying 2461 to 2490 of 9304

Palo Alto Networks News of the Week – April 30

We’ve rounded up all of the top Palo Alto Networks news from the past week right here. Unit 42 discussed Afraidgate, a major exploit kit campaign swapping Locky ransomware for CryptXXX. The team also highlighted the threat intelligence it contributed to the 2016 Verizon Data Breach Investigations Report (DBIR). Want to keep up with Palo Alto Networks threat intelligence? Sign up here in the “Get Updates” box, and receive updates from the Unit 42 threat intelligence blog in real time.

Anna Lough,
  • 336

Using the syslog Miner

The syslog miner can be used to extract indicators from logs coming from Palo Alto Networks NGFW platforms.   1. Adding a syslog Miner   In CONFIG, click on the browse prototypes button and select the stdlib.syslogMiner prototype.       Inside the prototype, click on CLONE to create a new

lmori,
  • 0

Continuous Diagnostics and Mitigation

The U.S. Government’s Continuous Diagnostics and Mitigation (CDM) program “support(s) … government-wide and agency-specific efforts to provide adequate, risk-based, and cost-effective cybersecurity.” The CDM program is designed to roll out in three phases. This white paper describes how the Palo Alto Networks Next-Generation Security Platform, in combination with select technology and delivery partners, supports all three CDM phases and enables agencies to achieve the security objectives of the program.

  • 0
  • 3608

Palo Alto Networks Named a Leader In Automated Malware Analysis Report

SANTA CLARA, Calif. – April 28 – Palo Alto Networks® (NYSE: PANW), the next-generation security company, today announced that its WildFire™ offering was recognized by Forrester® Research as a leader among automated malware analysis providers.

  • 0
  • 1796

National Collegiate Cyber Defense Challenge Finals

Each a year a competition between colleges is held called the Collegiate Cyber Defense Challenge (CCDC).  The US is divided into 10 regions, and then the winners from each region converge on San Antonio, Texas, to determine who is the best team in the nation.   For two days these

GBass,
  • 0

Version 3.3.10 Released on April 28th 2016 - Remember you need to patch your VM first

Hi,   This is the first hotfix after the mandatory patch provided last week. If you are still in a version under 3.3.9 please retrieve the patch and install from here : https://live.paloaltonetworks.com/twzvq79624/attachments/twzvq79624/mt_articles/111/1/mt3310c.bundle.zip   Fixes in 3.3.10 Added support for Zones to have more than 15 chars (introduced in Panos 7.X) FORTINET.

alestevez,
  • 0

Support for static local IP and Domain Lists

I'd like to start by saying, that this is an amazing tool! Thanks for sharing this, it has great potential and my customer is excited. One question: is there currently any support for creating and maintaining local IP and domain blocklists on the MineMeld? Instead of setting up a miner

nbilal,
  • 0

Configuring nodes

The set of config parameters supported by a node depends on the node class. Node configs are stored inside prototypes.   Base class All nodes support these parameters.   Parameters infilters: inbound filter set. Filters to apply to received indicators. outfilters: outbound filter set. Filters to apply to transmitted indicators.

lmori,
  • 0

Are You Getting the Most from Your Threat Intelligence Subscription?

The Value of Knowing More About Threats is Limited When it Cannot be Applied to Prevent Threats

  • 0
  • 659

Afraidgate: Major Exploit Kit Campaign Swaps Locky Ransomware for CryptXXX

In mid-April 2016, a campaign using Nuclear Exploit Kit (EK) to distribute Locky ransomware switched to using the Angler EK to install CryptXXX ransomware. This campaign uses gates registered through FreeDNS at afraid.org. We are calling this the Afraidgate campaign. Although we continue to see Locky distributed through malicious spam, we have not noticed Locky from EK traffic since mid-April. An Evolving Campaign In March 2016, we observed Nuclear EK from the Afraidgate campaign spreading Locky ransomware. A consistent gate pattern in the infection chain pointed to the same campaign …

Brad Duncan,
  • 0

Forrester Research Rates Palo Alto Networks a Leader for Automated Malware Analysis

We’re pleased that Forrester Research has identified Palo Alto Networks as a leader in The Forrester Wave™: Automated Malware Analysis, Q2 2016. As part of the report, Forrester evaluated WildFire based on criteria in the categories of current offering, market presence, and strategy. Automated malware analysis is a necessity in the security stack, providing visibility into targeted attack vectors and creating tailored threat intelligence to generate what Forrester calls “highest fidelity” alerts.

Joerg Sieber,
  • 0

2016 Verizon Data Breach Investigations Report (DBIR): Insights from Unit 42

The ninth annual edition of Verizon’s Data Breach Investigations Report (DBIR) has just been released, and Palo Alto Networks is proud to have contributed data and analysis to help make the report as comprehensive as possible. Palo Alto Networks is committed to sharing threat intelligence across the security industry, exposing the evolving nature of threats, in order for organizations to better protect themselves. This year we extracted a massive dataset from the AutoFocus threat intelligence service on over 38 million sessions carrying over 2.7 million unique malware samples. We worked …

Ryan Olson,
  • 918

How to Achieve PCI Compliance in AWS

Achieving PCI compliance in Amazon Web Services (AWS) involves determining where AWS compliance efforts intersect with your own compliance efforts. Who is responsible for documentation? And do the same concepts of network segmentation and separation apply within AWS, and if so how? These and many other questions arise when you combine PCI compliance with AWS.

Matt Keil,
  • 424

Five steps to protecting industrial Internet of Things infrastructure

The Internet of Things (IoT) is ushering in a fourth wave of the industrial revolution, with multiple industries such as manufacturing and healthcare leveraging connected devices to better manage industrial control systems (ICSs). However, this new capability also raises new security concerns, and companies need to take measures to address them.

  • 0
  • 671

Vulnerability Profile Rule vs Vulnerability Signature Action

In some cases, actions set on a vulnerability are not applied as expected. This is due to the policy inside the profile taking precedence over the individual vulnerability, if set to anything other than 'Default.'   The following is vulnerability protection profile and action for c2s is reset-both.    

pankaj.kumar,
  • 0

The description change in Threat Prevention license

The description of the Threat Prevention license was changed as follows in the mid of Aug 2015.   [before] > request license info License entry: Feature: Threat Prevention Description: Antivirus, anti-spyware, vulnerability protection   [after] > request license info License entry: Feature: Threat Prevention Description: Threat Prevention     This

ymiyashita,
  • 0

Palo Alto Networks Named 2016 Bay Area Best Place to Work

Palo Alto Networks® (NYSE: PANW), the next-generation security company, was ranked first by the 2016 Bay Area Best Places To Work, an awards program presented by the San Francisco Business Times and the Silicon Valley Business Journal. Palo Alto Networks topped the list of winners, consisting of 125 leading companies in the Bay Area.

  • 0
  • 6336

MT Move button

In the PAN-OS GUI there is a move button to move a rules or multiple rules up/down one or to the top/bottom. Is the functionality in the MT? If the policies are filtered, it would be nice to be able to select all those filtered rules and move them to

CJ.Rogers,
  • 0

How to merge snippet (log profile)?

Hello   I import log2panorama profile from snippet in my project. I used that profile in policies. Now I am at merging point, where to merge the "profile" from right side to left side? 

ghostrider,
  • 0

Log Forwarding Profile - To all policies in MT

Hello   I converted ScreenOS to PANOS configuration using MT. I want to make one log forwarding profile in MT and assign it to all policies. How I can do that?

ghostrider,
  • 0

Schedular conversion - ScreenOS to PANOS

Hello   I am using MT to convert screenOS to PANOS configuration. I lot of policies has schedular but MT did not convert any schedular. How I can do manually on MT then?

ghostrider,
  • 0

Four Imperatives for Cybersecurity Success in the Digital Age: Part 4

Having joined Palo Alto Networks following a 35-year career in the U.S. military, the past decade of which I served in a variety of leadership positions in cyber operations, strategy and policy, I have found that many of the cybersecurity challenges we face from a national security perspective are the same in the broader international business world. This blog post series describes what I consider to be four major imperatives for cybersecurity success in the digital age, regardless of whether your organization is a part of the public or private …

John Davis,
  • 466

IoT bringing more security concerns, says expert

The rise of the Internet of Things across industries is bringing with it a new wave of security concerns, and business need to be aware.

  • 0
  • 666

WildFire named a leader for Automated Malware Analysis

The Forrester Wave™: Automated Malware Analysis, Q2 2016 ranks WildFire as a leader in this space, through evaluation of its current offering, its market presence, and strategy.

  • 0
  • 3841

Live Community Roundtable @ Ignite 2016

What stood out most for you at Ignite 2016? Jeff asks this of the Live Community Solutions Engineers Tom Piens (reaper), Kim Wens (kiwi), and Joe Delio (jdelio).  You might be surprised to hear their responses.   Hang on to witness their reaction to PAN OS 7.1, announced at the

editeur,
  • 0

PAN OS 7.1 Announcement @ Ignite

Watch our Solutions Engineers and Team Manager, Jeff Browning, share the excitement about PAN-OS 7.1 at the unveiling of the release at Ignite 2016. Our engineers, Tom Piens (reaper), Kim Wens (kiwi), and Joe Delio (jdelio) join Jeff  in a roundtable discussion to spread the enthusiasm around this feature-rich release.

editeur,
  • 0

Watch: CEO Mark McLaughlin On Making Successful Breaches More Difficult for Attackers

Last week at the Joint Service Academy Cybersecurity Summit at the United States Military Academy in West Point, Palo Alto Networks President and CEO Mark McLaughlin spoke with Fox Business Network correspondent Jo Ling Kent about ongoing efforts to improve cybersecurity. Mark homed in on three things organizations can do to achieve the end goal of raising the cost of a successful attack, and making it successful breaches more difficult for attackers: Have a breach prevention mindset Make sure to share threat intelligence Continually educate the public on cybersecurity and good …

Chad Berndtson,
  • 366

Here’s How We Move Performance Testing Forward

Historically, firewall throughput performance metrics have been published using user dategram protocol (UDP), a stateless protocol that provides a relatively unrealistic metric for customers who are attempting to select the right firewall appliances. UDP is unrealistic for several reasons. First, it does not place significant computing strain on the firewall appliance under test, even when turning on security features such as application control, IPS, AV or APT protection. Second, no network has 100 percent UDP. Third, and most importantly, recent high profile breaches highlight the fact that attackers try to …

Matt Keil,
  • 697

address object/service convert to shared?

Hello   In migration tool, there is option to convert all address objects or services to shared? What does it means. Is it means when the PA firewall added into Panorama, all those objects would be shared?

ghostrider,
  • 0

What happened @ Ignite, everyone knows

Tom, Kim, and Joe, joined by team manager, Jeff, at Ignite 2016 in Las Vegas. Tom's visual recounting of the experience captures the magic of the three-day conference.   The all-star celebrity lineup was matched only by the star quality of Ignite attendees--the best of the best in the business

editeur,
  • 0
Displaying 2461 to 2490 of 9304