Date

By Source

By Technology

By Services

By Audience

Displaying 2461 to 2490 of 9095

Fortigate Services being truncated by MT.

Hi,      When I import the conf file from my FG5001B, the services that have more than 1 TCP or UDP port listed are truncated to only the first port number listed and the rest are lost.   Is there a fix for this?

Safo,
  • 0

Palo Alto Networks News of the Week – March 19

Check out all of the top Palo Alto Networks news from the past week right here. Unit 42 found the Digital Quartermaster scenario demonstrated in various attacks against the Mongolian Government. Researchers from Unit 42 also identified AceDeceiver, the first iOS trojan exploiting Apple DRM design flaws that can infect any iOS device.

Anna Lough,
  • 265

PAN-OS 7.1 Resource List

The table shows Live Community resources for PAN-OS 7.1, a brief description of the topic area, and the type of resource offered, a video tutorial or article.   TITLE DESCRIPTION TYPE PAN-OS 7.1 SaaS visibility and control SaaS Video Tutorial PAN-OS 7.1 UI - WebGUI update UI-WebGUI Video Tutorial PAN-OS

arsimon,
  • 0

Migration when new Palo's are not available

Hi,   I am migrating two ASA configurations to a single palo alto. This palo will be managed via Panorama. I am preparing for the migration. Panorama will be installed at customer site in few days. Is there a way to "export" converted configuration in a set command format so

o2networks,
  • 0

Unable to add a threat ID in DNS signatures for DNS sinkhole

Issue When trying to add a specific threat ID for DNS spyware related threat inside Objects > Security profiles > Anti-spyware > Profile > DNS signatures > Threat ID exceptions, you may get the following error:   Threat must be a value in range 3800000-4999999 or 5800000-5999999    

rchougale,
  • 0

Week 12 recap

Time out for March Madness—the National Collegiate Athletic Association (NCAA) basketball tournaments! Dashing talent dreaming of the pros, and caching talent streaming by the droves—on your time and with your dime. Palo Alto Networks, using tools and technologies like App-ID and QoS, creates custom signatures to address video streaming, so

editeur,
  • 0

Обзор платформы безопасности нового поколения Palo Alto Networks

Video (Russian): Application Usage and Threat Report (AUTR) Webinar Part 1   В данном видео будут рассмотрены возможности платформы безопасности нового поколения от Palo Alto Networks для идентификации и контроля приложений, пользователей/групп пользователей, функции защиты, включающие антивирус, защиту от эксплоитов и вторжений, защиту от ботнетов, включая анализ подозрительных DNS запросов,

editeur,
  • 0

Cybersecurity For Dummies

Next-generation cybersecurity provides visibility, control and integration of threat‐prevention disciplines needed to find and stop security threats.

  • 0
  • 3714

Channel Scoop – March 18, 2016

Sit back and relax. Let us do the information gathering and give you the channel scoop. In case you missed the Q3 NextWave Huddle, a replay is available on the Partner Portal.

Lang Tibbils,
  • 249

Locky: New Ransomware Mimics Dridex-Style Distribution

Ransomware persists as one of the top crimeware threats thus far into 2016. While the use of document-based macros for ransomware distribution remains relatively uncommon, a new family calling itself “Locky” has borrowed the technique from the eminently successful Dridex to maximize its target base. We first learned of Locky through Invincea and expanded on qualifying this threat with the help of PhishMe. Locky has also gained enough traction to find its way onto Dynamoo’s Blog and Reddit. Using Palo Alto Networks AutoFocus, Unit 42 observed over 400,000 individual sessions …

Brandon LeveneMicah YatesRob Downs,
  • 0

Apple OS target of another malware campaign in China

A new malware strain, AceDeceiver, that exploits a flaw in Apple's DRM software to target iOS devices through Windows PCs, has been detected by researchers at Palo Alto Networks

  • 0
  • 332

New Apple iPhone Malware Exploits DRM Mechanism To Spread

A new family of Apple iOS malware that has begun affecting users in China is another reminder of why it is generally not a good idea to jailbreak your iPhone or to download pirated software from unofficial mobile app stores.

  • 0
  • 334

Hack Brief: No Need to Freak Out Over That Chinese iPhone Malware

THE SECURITY TRACK record of Apple’s locked-down mobile operating system has been so spotless that any hairline fracture in its protections makes headlines. So when security researchers revealed that a new flavor of malware known as AceDeceiver had found its way onto as many as 6.6 million Chinese iPhones, the news was covered like a kind of smartphone bird flu, originating in Asia but bound to infect the globe. But for iPhone owners, the lesson is an old one: Don’t go to extraordinary lengths to install sketchy pirated apps on your phone, and you should be fine.

  • 0
  • 402

Hack Brief: No Need to Freak Out Over That Chinese iPhone Malware

THE SECURITY TRACK record of Apple’s locked-down mobile operating system has been so spotless that any hairline fracture in its protections makes headlines. So when security researchers revealed that a new flavor of malware known as AceDeceiver had found its way onto as many as 6.6 million Chinese iPhones, the news was covered like a kind of smartphone bird flu, originating in Asia but bound to infect the globe. But for iPhone owners, the lesson is an old one: Don’t go to extraordinary lengths to install sketchy pirated apps on your phone, and you should be fine.

  • 0
  • 273

New Apple iPhone Malware Exploits DRM Mechanism To Spread

A new family of Apple iOS malware that has begun affecting users in China is another reminder of why it is generally not a good idea to jailbreak your iPhone or to download pirated software from unofficial mobile app stores.

  • 0
  • 318

AceDeceiver Malware Targets Non-Jailbroken iOS Devices

Typically, iOS malware affects jailbroken iPhones, but Palo Alto Networks has identified a new family of iOS malware that infects non-jailbroken devices.

  • 0
  • 347

PAN-OS 7.1 Support for VMware tools on PA-VM platforms and Panorama VM

What are VMware tools? A package of binaries, scripts and drivers provided by VMware. When installed on a virtual appliance, VMware tools allow the VI admins additional management capabilities, such as access to management IP and resource utilization telemetry data through the vCenter Server.   Challenge Enterprises use VMware-provided management

jdelio,
  • 0

Palo Alto identifica malware que infecta iPhones - mesmo os que não passaram por jailbreak

A Unit 42, unidade de pesquisas da Palo Alto Networks, identificou um novo trojan capaz de infectar dispositivos iOS que não passaram por jailbreak, ou seja, que não tiveram o sistema operacional desbloqueado para a instalação de softwares não autorizados pela Apple. Chamado "AceDeceiver", o malware afeta atualmente usuários Apple na China.

  • 0
  • 309

Version 3.3.8 Released on March 17th 2016

Fixes: Checkpoint Exclusion Groups. Reviewed and fixed. OUTPUT-API: Subinterfaces were not added into Panorama templates.  Sub Atomic calls for Network profiles were incorrectly generated. Ike Gateways. The Ike crypto profile was not added correctly Filters. The whole policy filters language has been reviewed and now works as expected. Zone Grid.

alestevez,
  • 0

THE POLLS ARE OPEN: VOTE FOR THE CYBERSECURITY CANON (Week 6)

Week 6 of voting is now open for this year’s inductees into The Cybersecurity Canon. To get you ready for the upcoming March Madness, we’re shaking things up and doing voting bracket competition style! Here’s how it works:

Rick Howard,
  • 358

Connect to Protect: CSO Thoughts from RSA 2016

The theme of this year’s RSA Conference was “Connect to Protect,” promoting connections among the information security community, IT and other parts of the enterprise, and private and public sectors. It was the 25th annual event, which saw 40,000+ attendees and more than 550 vendors in the expo hall showing off their wares. Over a number of days, keynotes from industry leaders addressed the need to do something different. Debates focused on the Internet of Things, industrial control systems, encryption, artificial intelligence and machine learning, crowdsourcing, and more, with many …

Sean Duca,
  • 437

Available Now: March Madness Custom App-IDs

The annual college basketball frenzy known as March Madness is in full swing. Brackets are feverishly pored over, office pool picks are made and men and women alike argue about the existence of the next “Cinderella”. And then it starts: the passionate tracking of your picks.

Matt Keil,
  • 845

iOS Malware "AceDeceiver" Exploits Flaw in Apple DRM

Researchers have discovered a new iOS malware family that abuses design flaws in Apple’s FairPlay digital rights management (DRM) technology to infect devices, even ones that haven’t been jailbroken.

  • 0
  • 315

This Nasty New Malware Can Infect Your Apple iPhone or iPad

pple’s mobile operating system just got a nasty bug. Researchers from the cybersecurity firm Palo Alto Networks PANW 0.02% said on Wednesday that they discovered new malware that can infect Apple iOS devices even if they aren’t jailbroken.

  • 0
  • 365

'AceDeceiver' iPhone Malware Uses Pirate Skills To Sneak Past Apple Security

A unique kind of iPhone malware has been uncovered, exploiting design flaws in Apple’s FairPlay digital rights management (DRM) protection mechanism FairPlay. Unlike most strains of iOS malicious software, the so-called AceDeceiver works on non-jailbroken iPhones.

  • 0
  • 335

Apple 'AceDeceiver' DRM Flaw Allows Malware To Install Itself On Non-Jailbroken iPhones

Security researchers from Palo Alto Networks uncovered a new iOS malware family that takes advantage of vulnerabilities in Apple’s DRM software and can infect non-jailbroken devices. The researchers called the malware “AceDeceiver.”

  • 0
  • 322

AceDeceiver: First iOS Trojan Exploiting Apple DRM Design Flaws to Infect Any iOS Device

We’ve discovered a new family of iOS malware that successfully infected non-jailbroken devices we’ve named “AceDeceiver”. What makes AceDeceiver different from previous iOS malware is that instead of abusing enterprise certificates as some iOS malware has over the past two years, AceDeceiver manages to install itself without any enterprise certificate at all. It does so by exploiting design flaws in Apple’s DRM mechanism, and even as Apple has removed AceDeceiver from App Store, it may still spread thanks to a novel attack vector. AceDeceiver is the first iOS malware we’ve …

Claud Xiao,
  • 0

Enable High Availability

With the emergence of an application-driven economy and the persistent risk of cyberattacks, enterprises large and small are finding it critical to maintain highly available and continuous next-generation security protection for their network infrastructure.

  • 1
  • 1190

Industrial Control Systems

The Security Reference Blueprint for Industrial Control and SCADA Systems provides a framework in which Owner/Operators can protect these critical systems from compromise, rationalize the scope of compliance, and more, using the core capabilities of Palo Alto Networks next-generation security platform.

  • 0
  • 1088

How to Submit a Vulnerability Signature False Positive

Overview When submitting a vulnerability false positive report, preemptively gathering data to attach to the case will result in a quicker turn around time.   Vulnerability false positives are handled differently than virus false positive reports; while virus false positive investigations usually involve inspection of the offending file, vulnerability false positives

rcole,
  • 0
Displaying 2461 to 2490 of 9095