Date

By Source

By Technology

By Services

By Audience

Displaying 2461 to 2490 of 9709

MT Project stats address count does not tally.

Hi Guys,   Anyone encountered a mismatch between the address that MT detects and the address that it has in the objects tab. The config was from a mcafee sidewinder, when i was attempting to load the config into a PA-5000 did i notice that my objects were missing.  

Yurong,
  • 0
  • 0

Orcus – Birth of an unusual plugin builder RAT

Unit 42 has been tracking a new Remote Access Trojan (RAT) being sold for $40 USD since April 2016, known as “Orcus”. Though Orcus has all the typical features of RAT malware, it allows users to build custom plugins and also has a modular architecture for better management and scalability. The objective of this blog is to highlight some of the capabilities of this new RAT family and the impact seen so far.

Vicky Ray,
  • 0
  • 0

Palo Alto Networks News of the Week – July 30, 2016

Catch up on all of the top Palo Alto Networks news from the week. Unit 42 had a busy week! Researchers Robert Falcone and Jen Miller-Osborn observed a 9002 Trojan delivered using a combination of shortened links and a shared file hosted on Google Drive. Palo Alto Networks researchers Tongbo Luo and Bo Qu were credited with the discovery of a WebKit vulnerability affecting Safari. Jacob Soo discovered SpyNote, a remote spying Android trojan, leaked on several malware discussion forum. Unit 42 also observed Afraidgate, a major Exploit Kit campaign …

Anna Lough,
  • 0
  • 0

Serbian Company Delta Holding Pushes Back on Cybercrime With Palo Alto Networks Next-Generation Security Platform

Delta Holding has selected the Palo Alto Networks Next-Generation Security Platform to prevent ransomware from disrupting business operations.

Santa Clara, Calif.
  • 0
  • 459

Palo Alto Networks to Announce Fourth Quarter and Fiscal Year 2016 Financial Results on Tuesday, August 30, 2016

Palo Alto Networks® (NYSE: PANW), the next-generation security company, today announced that it will release its financial results for its fourth quarter and fiscal year 2016 ended July 31, 2016 after U.S. markets close on Tuesday, August 30, 2016. Palo Alto Networks will host a conference call that day at 1:30 p.m. Pacific Time (4:30 p.m. Eastern Time) to discuss the results.

Santa Clara, CA
  • 0
  • 445

Next-Gen Drive: Robert Megennis Wins Tilton Hard Charger Awards at Grand Prix of Toronto

Robert Megennis is a 16-year-old racing prodigy. Palo Alto Networks is proud to be an ongoing sponsor of Rob’s races for the 2016 Mazda Road to Indy racing season. We’ll be checking in to chronicle his adventures as a true next-generation competitor! Grand Prix of Toronto Rob just finished up at the Grand Prix of Toronto where, in the qualifying round, an electrical fault ended Rob’s session after just one lap, and he qualified P19 of 20. He roared back in race one, though, and passed 14 cars to finish P5. …

Chad Berndtson,
  • 0
  • 0

Mark McLaughlin Named to CRN’s Top 100 Executives List

August is off to a great start for Palo Alto Networks as our CEO Mark McLaughlin has been named to CRN’s Top 100 executives list. Published annually, CRN’s Top 100 executives list honors executives from companies that are leveraging the channel most effectively — leaders who play an integral role in shaping the industry, whether by driving huge cultural shifts or forging innovative new routes to success.

Lang Tibbils,
  • 0
  • 0

DotW: Dynamic Block List - Limited Number of Entries?

Sometimes all the information and specs of a specific unit can be a bit confusing.  In this week's discussion, we'll cover the limitation on number of entries on dynamic block lists. User 'networkadmin' was struggling to get a clear idea about the size limit of each blocklist:   A question about

kiwi,
  • 0
  • 0

New Android Trojan SpyNote leaks on underground forums

A new and potent Android Trojan has been leaked on several underground forums, making it available for free to less resourceful cybercriminals who are now likely to use it in attacks, according to researchers at Palo Alto Networks.

  • 0
  • 975

New Trojan SpyNote Installs Backdoor on Android Devices

A new Android Trojan called SpyNote has been identified by researchers who warn that attacks are forthcoming. The Trojan, found by Palo Alto Networks’ Unit 42 team, has not been spotted in any active campaigns, but it is now widely available on the Dark Web and that it will soon be used in a wave of upcoming attacks.

  • 0
  • 1093

New Trojan SpyNote Installs Backdoor on Android Devices

A new Android Trojan called SpyNote has been identified by researchers who warn that attacks are forthcoming. The Trojan, found by Palo Alto Networks’ Unit 42 team, has not been spotted in any active campaigns, but it is now widely available on the Dark Web and that it will soon be used in a wave of upcoming attacks.

  • 0
  • 970

Security Reference Blueprint for Banking IT

The Security Reference Blueprint for Banking IT provides a framework in which banks can secure their network, users, and applications using the core capabilities of Palo Alto Networks next-generation security platform.

  • 19
  • 731

Network Segmentation as a Business Enabler for Financial Services

As part of a layered security philosophy, network segmentation helps financial institutions survive intrusions and minimize or prevent data breaches. Read more.

  • 1
  • 744

Delta Holding

Delta Holding eliminated ransomware and gained a comprehensive shield against malware and zero-day attacks with Palo Alto Networks Next-Gen Security Platform.

  • 0
  • 1130

config imported from MT - gives error "is not a valid reference"

Hello   I created basic config in MT - few interfaces/zones/security rules:     Using "Generate XML and set output" saved config to File1.xml Next, I imported File1 into VM-100 and get error:     Why this happend to Ethernet 1/3.155 and others? Interfaces without subinterfaces, like 1/4 was imported

_slv_,
  • 0
  • 0

Week 31 Recap

TAKE OUR SURVEY! Make the Live Community work for you! Take our survey at https://www.surveymonkey.com/r/PANWlivecommunitysurvey and let us know what's working for you -- or not -- in the community.   MINEMELD Excavating all there is to know, to learn, and to act on threat, then bringing all that intel together

editeur,
  • 0
  • 0

Visit Palo Alto Networks at Black Hat USA 2016

We’re just days away from Black Hat USA 2016, where top security minds and researchers from around the world will gather to share their expertise with the rest of the security community. Join us at Booth #1000 in the Expo Hall on Wednesday, August 3 and Thursday, August 4 to experience all of the new and exciting things Palo Alto Networks has to offer, such as:

Catherine Crandall,
  • 0
  • 0

Palo Alto Networks Researchers Discover Critical Safari 9.1 Vulnerability

Palo Alto Networks researchers were recently credited with the discovery of an Apple product vulnerability. Researchers Tongbo Luo and Bo Qu discovered a WebKit vulnerability (CVE-2016-4589) affecting Safari in Apple iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later, and Apple TV (4th generation).

Ryan Olson,
  • 0
  • 0

Tips to Prevent Ransomware in Healthcare Environments

If 2015 was the year of the healthcare breach, 2016 is shaping up to be the year of ransomware. By this time last year, 105 healthcare breaches had been reported to the U.S. Department of Health and Human Services (HHS) for a total of over 92 million lost records, compared to “only” 81 breaches and 3.5 million records so far in 2016. Good news, right? Well, sort of. Unfortunately, this seemingly positive trend does not reflect the actual threat landscape in the healthcare industry. Healthcare organizations subject to HIPAA only need …

Matt Mellen,
  • 0
  • 4

Problem using URL-filterlists for PA

Hello,   I am very happy, that I can create dynamical lists for using it in the PA. So I use ransomwaretracker.RW_URLBL with stdlib-aggregatorURL as prozessor and stdlib.feedHCGreen as output to create a URL-list. So I got a list like:   ... http://217.64.197.138/~rivista_ipi/4kkmkfz http://237travellin.com/92nwao23 http://237travellin.com/telo70 ...   I have tested

R.Boehm,
  • 0
  • 0

Error Checking credentials - Gateway Timed out

Hi There,   I have installed Minemeld on my Ubuntu Server 14.04.. And the service is up and running.. Wheneve I use the default Username and Password to logon to the console, it gives me an error "Error Checking credentials - gateway timed out".. I have also checked the file

maltwist,
  • 0
  • 0

Error Checking credentials - Gateway Timed out

Hi There,   I have installed Minemeld on my Ubuntu Server 14.04.. And the service is up and running.. Wheneve I use the default Username and Password to logon to the console, it gives me an error "Error Checking credentials - gateway timed out".. I have also checked the file

maltwist,
  • 0
  • 0

Tips for Searching Sample with File Hash in AutoFocus

Note: Searching partial file hash is not currently supported.   Tip #1: Search for a sample with a known file hash value   Option A Select approripate hash type (MD5, SHA256, etc) Select operator 'is' Specify file hash value Click Search     Option B Select Artifact 'Hash' Select Operator

spiromruen,
  • 0
  • 0

SpyNote Android Trojan Builder Leaked

Our team recently discovered a new Android Trojan called SpyNote which facilitates remote spying. The builder, which creates new versions of the malware, recently leaked on several malware discussion forums. SpyNote is similar to OmniRat and DroidJack, which are RATs (remote administration tools) that allow malware owners to gain remote administrative control of an Android device.

Jacob Soo,
  • 0
  • 0

VLAN Insertion: Become Secure and Compliant with Network Segmentation

In the past when I was architecting/implementing for ICS ecosystems I found out very early that one of the major steps to securing an ICS/SCADA, or any other network, is segmentation. During my efforts to secure these ecosystems, I learned that with network segmentation in place and a little forethought, it is possible not only to secure these environments but also build a scalable and compliant network that is future-proof. Segmentation, in my opinion, could be the single most important thing that a network practitioner can do to protect not …

Lionel Jacobs,
  • 0
  • 0

user for web-gui

Hello,   at first, thank you for that great tool, especially for the gui. I will change the password for admin. How can I do this? With htpasswd? And, is it possible to add users with different privilegs?   Thank you for your efforts.

R.Boehm,
  • 0
  • 0

Help on CSV Output Feed

I'm looking to output feeds to a format that I can ingest in some log analysis tools, and need to output fields that I have defined in miners. Is there any information on how to access that data and output it?

kx1499,
  • 0
  • 0

Gastkommentar: EU-Datenschutzvorschriften sind Weckruf

Greg Day von Palo Alto Networks ist überzeugt: Neue EU-Datenschutzvorschriften werden in den Führungsetagen für einen großen Weckruf in Sachen Cybersicherheit sorgen.

  • 0
  • 947

Let’s not forget RegTech is also about cybersecurity

Regulatory Technology (RegTech) is becoming more of a tool to help organisations comply with automation and regulatory requirements, but Palo Alto Networks believes that they should be aware of how it will affect cybersecurity and the implications on busines operations.

  • 0
  • 1028

Tips & Tricks: Considerations for TS Agent and User-ID Agent in a Mixed Environment

In an environment where both Terminal Services (TS) Agent and User Identification (User-ID) Agent are used to ascertain which users are logged on to certain systems, some precautions need to be taken to prevent incorrect mapping of users, mainly regarding the terminal servers, where multiple users can be logged on

reaper,
  • 0
  • 1
Displaying 2461 to 2490 of 9709