Date

By Source

By Technology

By Services

By Audience

Displaying 2581 to 2610 of 10856

Integrate with MISP

Hi all,   Do you know something sample about integration with MISP (Malware Information share platform)???   So another question is about scripts, can I launch a script into conifg a new prototype? If I've created a new prototype I set a url option...can I set the url option for

SantiBT,
  • 0
  • 1

Full control with GlobalProtect on-demand!

No need to use Bothans to do anything for you. They die too easily anyway! GlobalProtect delivers security to any user, any device, anywhere.  Even to Bothans!   GlobalProtect network security for endpoints extends the protection of next-generation security to the mobile workforce in order to stop targeted cyberattacks, evasive

kiwi,
  • 0
  • 3

CRN Again Recognizes Palo Alto Networks Executives for Channel Leadership

CRN recognizes Ron Myers and Todd Palmer on their esteemed Channel Chiefs list.

Lang Tibbils,
  • 0
  • 0

K–12 Education: Safeguarding Students and Data While Minimizing Complexity

Learn about our solutions for K-12 education.

Pamela Warren,
  • 0
  • 2

Minemeld behind corporate proxy

Following all the requirements for proxy configuration - https://live.paloaltonetworks.com/t5/MineMeld-Discussions/Minemeld-with-Proxy/m-p/77356/highlight/true#M85 I can perform a curl request, for example curl https://www.spamhaus.org/drop/edrop.txt and get back a response. /etc/default/minemeld is configured with the proxy settings as well as /etc/environment. But still getting an error:   2017-02-20T00:04:30 (212)basepoller._poll ERROR: Exception in polling loop for spamhaus_DROP:

calamari,
  • 0
  • 1

Palo Alto Networks News of the Week – February 18, 2017

Sit back, relax and enjoy the top Palo Alto Networks news of the week!

Justin Hall,
  • 0
  • 0

Integração impulsiona inteligência e inovação em Segurança Cibernética

C-Levels da Palo Alto Networks afirmam na RSA Conference que estratégias de segurança precisam ser pautadas em visibilidade e apontam a integração de tecnologias como a melhor aliada no combate ao cibercrime

  • 0
  • 1644

Channel Scoop – February 17, 2017

Catch up on the latest NextWave Partner news in this week's Channel Scoop.

Lang Tibbils,
  • 0
  • 0

A Look Back at RSA Conference 2017

Highlights from our week at RSA Conference 2017.

Anna Lough,
  • 0
  • 0

PAN-OS 8.0: Service Providers and Customers Benefit From Expanded Line of Virtual Network Functions

Learn how service providers and customers can benefit from the expanded line of virtual network functions.

Eila Shargh,
  • 0
  • 4

Palo Alto Networks to Present at Upcoming Investor Conferences

Palo Alto Networks® (NYSE: PANW), the next-generation security company, today announced that a member of its management team will be presenting at the following financial community events: Morgan...

Santa Clara, CA
  • 0
  • 182

Security platforms to disrupt industry, predicts Palo Alto Networks

Security platforms with open application programming interfaces (APIs) are set to turn the business model for the information security on its head, according to Mark McLaughlin, president and CEO of Palo Alto Networks.

  • 1
  • 1762

4 reasons to prioritize cloud security this year

A tremendous amount of healthcare data will be moved to the Amazon Web Services and Microsoft Azure clouds for either private or public use in 2017. It makes sense, because hospital leaders are of the mindset that they prefer to be in the business of treating patients, rather than managing data centers.

  • 0
  • 1576

LiveWeek 6:2017

WE LOVE WHAT WE DO TOGETHER   We celebrated love this week. Millions of people throughout the world observed Valentine's Day, giving acknowledgement and attention wherever due or desired. We echo the sentiment here in the Live Community with a resounding community rally of 'We too!'  While still swooning in

editeur,
  • 0
  • 0

MineMeld real-world usage to reduce threats?

So far I'm using MineMeld to pull Dshield and Spamhaus feeds to use to block inbound connections to our internet facing servers.   Whilst there are loads of miners I'd love to know which ones people have found "safe" enough to use on production inbound and outbound traffic/rules and how much

networkadmin,
  • 0
  • 0

What Is a Credential-Based Attack?

Phishing and credential-based attacks have proven to be one of the most effective means of penetrating an organization. Attackers utilize various password-theft techniques to breach organizations, compromise their networks and steal critical data. There are two elements of a credential-based attack: credential theft and credential abuse.

Karin Shopen,
  • 0
  • 4

menuPass Returns with New Malware and New Attacks Against Japanese Academics and Organizations

In 2016, from September through November, an APT campaign known as “menuPass”  targeted Japanese academics working in several areas of science, along with Japanese pharmaceutical and a US-based subsidiary of a Japanese manufacturing organizations. In addition to using PlugX and Poison Ivy (PIVY), both known to be used by the group, they also used a new Trojan called “ChChes” by the Japan Computer Emergency Response Team Coordination Center (JPCERT).  In contrast to PlugX and PIVY, which are used by multiple campaigns, ChChes appears to be unique to this group. An …

Jen Miller-OsbornJosh Grunzweig,
  • 0
  • 1

PAN-OS 8.0: Multi-Method Threat Prevention Is Here!

Learn about the new advanced threat prevention techniques released as part of PAN-OS 8.0.

Scott Simkin,
  • 0
  • 5

"enhanced" YouTube Miner and Age_Out problem

I have rewritten the available YouTube Miner (https://github.com/PaloAltoNetworks/youtube-miner) since it only mines the first 30 Videos from a user.    It now uses the YouTube API (so you need an API Key) and it mines all videos in a playlist (playlist ID required). These two variables are set via the

faeppli,
  • 0
  • 0

Integrating MineMeld with IBM QRadar

Using MineMeld TAXII output nodes and IBM QRadar Threat Intelligence app, it is possible to populate IBM QRadar reference sets with Threat Intelligence indicators processed by MineMeld. Reference Sets can then be used in IBM QRadar rules to detect suspicious activities   After installing IBM QRadar Threat Intelligence app (available on IBM

lmori,
  • 0
  • 3

panos_syslog IP indicator - withdraw

  I am trying to create an IPv4 indicator list based on PAN-OS threat logs. Below is the rule code attached to the syslogminer class stdlib.syslogMiner.     RULE: age_out:    default: last_seen+30d    interval: 1800    sudden_death: false attributes:    confidence: 50    type: IPv4 conditions:    - type

rchilukuri,
  • 0
  • 0

Magic Hound Campaign Attacks Saudi Targets

Unit 42 discovers a persistent attack campaign operating primarily in the Middle East dating back to at least mid-2016 which they have named Magic Hound.

Bryan LeeRobert Falcone,
  • 0
  • 1

Banking Trojans: Ursnif Global Distribution Networks Identified

Unit 42 analyzes the Ursnif banking Trojan.

Kaoru Hayashi,
  • 0
  • 9

PAN-OS 8.0: Accelerating Large-Scale, Multi-Cloud Deployments

Learn how PAN-OS 8.0 helps to accelerate large-scale, multi-cloud deployments.

Sai BalabhadrapatruniStephanie JohnsonMatt Keil,
  • 0
  • 1

The Cyber Threat Alliance: How Far We’ve Come and Where We’re Going

Palo Alto Networks CSO Rick Howard blogs about the Cyber Threat Alliance, how far it's come, and where it's going.

Rick Howard,
  • 0
  • 0

Distributed Denial of Service (DDoS), what can I do to protect myself?

Distributed Denial of Servide (or DDoS for short) attacks are all too common in today's internet of things. It's very cheap to rent  (yes people are renting infected machines!) an army of infected hosts (including infected refridgerators and home thermostats!) to lay siege to a network of your choosing.  

reaper,
  • 0
  • 1

Create a miner to mine from Autofocus MineMeld

Hi, with the release of PANOS 8.0, Autofocus will have a minemeld build in.   May I know if we can have a on premise minemeld to fetch the feeds from the Autofocus Minemeld?   I tried to grab the minemeld feeds but it shows me unauthorized access.   Do

yctan,
  • 0
  • 2

Cybersecurity alliance promoting intel-sharing seeks to expand

Hackers have probably had a harder time slipping past your security software, thanks to an alliance between some of the top vendors in the industry. The Cyber Threat Alliance, a group of security firms that often compete, says its efforts to share intelligence on the latest hacking threats have been paying off.

  • 0
  • 1664

What to Know Before Choosing a Malware Analysis Environment

Even the Most Advanced Malware Analysis Environment could potentially be Circumvented by a Sufficiently Advanced Attacker. From a technology perspective, it has never been a better time to be in the cyberattack business. Thanks to the common availability of attack tools in the underground marketplace, today’s adversaries don’t require the technical know-how to develop malware.

  • 0
  • 1639

Rise of as-a-service lowers bar for cybercriminals

HAs-a-service offerings for things such as DDoS and malware -- including ransomware -- via exploit kits has seriously lowered the bar for entry into the criminal market. Hackers no longer need to have sophisticated skills in order to gain entry into the world of cybercrime. Scott Simkin weighs in.

  • 0
  • 1513
Displaying 2581 to 2610 of 10856