Date

By Source

By Technology

By Services

By Audience

Displaying 2611 to 2640 of 10485

Review of Regional Malware Trends in EMEA: Part 1

Introduction As we head towards the end of the year it’s common to reflect on the year almost behind us and to predict what the new year approaching will bring in terms of security challenges. This blog is part of a series that describe malware trends seen in the EMEA (Europe Middle East and Africa) region over the last six months of 2016. Not long after joining Palo Alto Networks and the Unit 42 Threat Research team I was tasked with authoring and publishing monthly regional threat reports for internal …

Alex Hinchliffe,
  • 0
  • 0

2017 Cybersecurity Predictions: Japan Confronts SMB Cyber Resiliency, Anticipating Tokyo 2020

This post is part an ongoing blog series examining “Sure Things” (predictions that are almost guaranteed to happen) and “Long Shots” (predictions that are less likely to happen) in cybersecurity in 2017.  In Japan there is much hype around the 2020 Summer Olympics and the expectation that the event will create new business opportunities. There is also concern about cyberattacks disrupting the Tokyo 2020 Olympic Games operations and the theft of national security and/or trade secrets. This type of attack would harm the competitiveness of companies in Japan and damage …

Mihoko Matsubara,
  • 0
  • 0

How to Block the GOM VPN Application

GOM VPN is an extension in the Chrome browser that enables blocked websites to be browsed through the firewall by encrypting the data inside the SSL connection.   In order for blocked websites to still be blocked, the GOM VPN SSL connection needs to be blocked through the firewall. There

poagrawal,
  • 0
  • 0

Weekly Recap 51

DOTW: DISCUSSION OF THE WEEK BLOCKED TRAFFIC HAS AN ALLOW LOG An allow log for blocked traffic certainly seems a bit unexpected, right? If a particular category is blocked by URL filtering, what mechanisms would allow traffic through? Let's get to the bottom of this seeming oddity in the Discussion of

editeur,
  • 0
  • 0

How to bulk edit action in a security profile

This article explains how to edit action for multiple signatures at once in Antispyware or Vulnerability Protection profile and categories in the URL filtering profile.   Steps Navigate to the profile where an action needs to be modified for the signatures (for e.g. Vulnerability Protection) and select the desired profile.

poagrawal,
  • 0
  • 0

TOR prototype for MineMeld like is available on panwdbl?

Hi,   Anyone have a prototype for the TOR IP list already aggregated by panwdbl via Emerging Threats?   Thank you.

andrew.stanton,
  • 0
  • 1

Tech Docs: Traps 3.4.2 Documentation Now Available

Technical Documentation for the recent Traps 3.4.2 release is now available! Read about the latest in Traps advanced endpoint protection on the Technical Documentation site. Highlight: You can now install Traps on Windows Server 2016 Standard (Server with Desktop Experience) with this release. Download the software from the Support portal by selecting Software Updates and then filtering by one of the Endpoint categories. Happy reading! Your friendly Technical Documentation team Have a question? Email us at: documentation@paloaltonetworks.com

Charissa Fleischer,
  • 0
  • 3

Palo Alto Networks News of the Week – December 17, 2016

Did you miss any of this week’s Palo Alto Networks action? Don’t worry, we’ve rounded up the top news right here. Our Cybersecurity Predictions series continued with sure things and long shots for cybersecurity in 2017. This week’s predictions include: Machine Learning and AI-Driven Frameworks Shape Cloud Security Price of Ransomware Continues to Increase in Asia-Pacific Service Providers Confront IoT Security Unit 42 explored the latest DealersChoice attacks attributed to the Sofacy group. This week we announced our UK and Ireland partner award winners. A big congrats to all! Ron …

Justin Hall,
  • 0
  • 1

Channel Scoop – December 16, 2016

Sit back and relax. Let us do the information gathering and give you the channel scoop. Q2 FY17 NextWave Huddle: Read Ron Myers’ 5 Key Takeaways blog, which includes a links to the webinar replay and presentation. Exclusive Offer for Traps Specialized Partners: Looking for a way to move your customer from preference to close, download our new Traps Advanced Endpoint Protection, Ultimate Test Drive, which includes a complete “how to guide” and co-brand customer emails. Use It or Lose It Federal Budgets: Only a few days left to capture …

Lang Tibbils,
  • 0
  • 0

Palo Alto Networks Unit 42 Vulnerability Research December 2016 Disclosures

As part of Unit 42’s ongoing threat research, we can now disclose that Palo Alto Networks Unit 42 researchers have reported six vulnerabilities that have been fixed by Apple, Adobe and Microsoft. This includes two vulnerabilities in Apple WebKit and impacts iCloud for Windows, Safari, iTunes for Windows, tvOS and iOS. CVE-2016-7639: Tongbo Luo CVE-2016-7642: Tongbo Luo This includes three code execution vulnerabilities affecting Adobe Flash (APSB16-39). CVE-2016-7873: Tao Yan CVE-2016-7874: Tao Yan CVE-2016-7871: Tao Yan And this includes one memory corruption vulnerability affecting Microsoft Office for the Mac (MS16-148): …

Christopher Budd,
  • 0
  • 2

Let It Ride: The Sofacy Group’s DealersChoice Attacks Continue

Recently, Palo Alto Networks Unit 42 reported on a new exploitation platform that we called “DealersChoice” in use by the Sofacy group (AKA APT28, Fancy Bear, STRONTIUM, Pawn Storm, Sednit).  As outlined in our original posting, the DealersChoice exploitation platform generates malicious RTF documents which in turn use embedded OLE Word documents. These embedded OLE Word documents then contain embedded Adobe Flash (.SWF) files that are designed to exploit Abode Flash vulnerabilities. At the time of initial reporting, we found two variants: Variant A: A standalone variant that included Flash …

Robert FalconeBryan Lee,
  • 0
  • 2

2017 Cybersecurity Predictions: Service Providers Confront IoT Security

This post is part of an ongoing blog series examining “Sure Things” (predictions that are almost guaranteed to happen) and “Long Shots” (predictions that are less likely to happen) in cybersecurity in 2017.  Based on the trends we are seeing within the mobile industry, here are some predictions for 2017: Sure Thing: Cyberattackers will target service providers by tapping into wide network of IoT devices We have seen how IoT and wearable technology can be used by cyberattackers to launch unprecedented levels of volumetric attacks aimed at taking down specific …

Peter Margaris,
  • 0
  • 8

Sofacy APT doubles down on its 'DealersChoice' Flash exploit campaign

Russian advanced persistent threat group Sofacy has upped the ante in its campaign to compromise organizations with its “DealersChoice” Flash Player exploit tool, even after Adobe patched a zero-day Flash vulnerability that the tool was observed exploiting.

  • 0
  • 1800

Exceeding IPs in one list

Hi,   The miner Ransomware IP has > 10000 so I'am wondering how I could solve this issue. Should have some output feed that you can define to take a certain amount of IP's so you can map that on your hardware. And then create a second output that is

kevin_thys,
  • 0
  • 0

MineMeld outbound calls impacted by SSL interception

I could see the node was having problems pulling the external resource due it being decrypted and our CA being used.   I added our CA to the Ubuntu store with the processes used here, but still no juice.   http://askubuntu.com/questions/645818/how-to-install-certificates-for-command-line   Thoughts?

andrew.stanton,
  • 0
  • 0

LiveWire Newsletter, December 2016

LiveWire – New Community Updates, Blocking Snapchat, MineMeld, and more   Dear Live Community member,   Welcome to LiveWire, your monthly Palo Alto Live Community newsletter.  Through LiveWire, we deliver monthly highlights, important technical news, and events from Live Community and Palo Alto Networks.    LIVE Community, your cybersecurity community

carnould,
  • 0
  • 0

Slack channel ?

is there slack channel for minemeld ?

niuk,
  • 0
  • 0

How to maintain security while employees are out of the office for the holidays

The downtime created by the holiday season is a fan favorite for enterprise employees and hackers alike. As workers are enjoying time away from the office for vacations or working remotely, hackers are viewing this slow down as an optimal time to attack corporate systems. To avoid having your organization turn into this holiday’s victim, security professionals provide tips for IT managers to protect corporate data, as well as share recommendations for using the slower cycles to test security systems.

  • 1
  • 1786

Output does not work

I have created a miner with prototype ransomwaretracker.RW_IPBL., and processor and outputs.   Miner shows 11497 indicators but processor and outpus shows 0 indicators.   It cloned the model with default.   I have attached a pdf with setup.   I would appreciate help.   Thank you.  

Sistemas_SanLucar,
  • 0
  • 0

WildFire portal error 418 (Unsupported File type) for JAR files

JAR files are supported for analysis in WildFire.  .class files within JARs contain executable code. If the JAR file does not contain any .class files within it, then there is no code for the WildFire sandbox to analyze. In this instance, the WildFire Portal will return the 418 Unsupported File Type

ldemos,
  • 0
  • 1

Q2 FY17 NextWave Huddle: Top 5 Takeaways

If you missed the Q2 NextWave Huddle, our quarterly partner webcast, I encourage you to watch the full replay and review the presentation. When analyzing our performance in a given quarter, I look at three key indicators: business momentum, customer momentum and channel momentum. In Q1 FY17, together with you, our partners, we delivered exceptional results in all three areas: Business Momentum: We achieved 34% year-over-year revenue and 33% year-over-year billings growth. Customer Momentum: We added more than 1,500 new customers and ended the quarter with more than 35,500 customers …

Ron Myers,
  • 0
  • 0

2017 Cybersecurity Predictions: Price of Ransomware Continues to Increase in Asia-Pacific

2016 was a challenging year for organisations particularly as cyber adversaries achieved high-profile success, mainly with ransomware. Organisations in Asia-Pacific are no exception. The year also taught a valuable lesson that no industry vertical is safe; if there is a hole in your security, a determined adversary will find it. 2017 should be an opportunity for organisations to instigate a regular program of security risk assessments to stay ahead in cybersecurity. New technologies and ever-increasing levels of connectivity are transforming businesses and unlocking business development opportunities across the region. Being …

Sean Duca,
  • 0
  • 1

Congratulations to Our UK and Ireland Partner Award Winners

With technology changing at a rapid pace and having such a profound impact on the digital world in which we now spend so much of our business and personal lives, new and innovative approaches have emerged in response to our most complex security challenges. Palo Alto Networks has been leading the charge with its Next-Generation Security Platform, and we couldn’t do this without our partners. This week, we took some time to get together with our UK and Ireland partners in London to make sure they were up to speed …

Michael Herman,
  • 0
  • 0

2017 Cybersecurity Predictions: Preparation, Proliferation, Personnel and Protection = A Bumper Year in EMEA

The innovations in today’s digital world continue to advance at a tremendous pace, and 2016 didn’t fail to have its own impact on society. As a hobbyist in remote flight, the introduction of drones to deliver blood and medicines in Rwanda from a Silicon Valley startup was an amazing example of how the Internet of Things can have a hugely positive impact on society. I can’t wait for the completion of the $10 million Tricorder XPRIZE to be announced in early 2017, when fiction is expected to become fact, as …

Greg Day,
  • 0
  • 0

2017 Cybersecurity Predictions: Ransomware and SaaS Challenges Persist in Healthcare

This post is part of an ongoing blog series examining “Sure Things” (predictions that are almost guaranteed to happen) and “Long Shots” (predictions that are less likely to happen) in cybersecurity in 2017.   2016 was the year of ransomware in cybersecurity, and it was especially impactful in healthcare. In this blog post, I’ll lay out a few predictions about the type of threats that the healthcare industry will face in 2017. Sure Things 1. Ransomware Will Continue to Target Healthcare I suppose this is an obvious one. Many hospitals …

Matt Mellen,
  • 0
  • 6

2017 Cybersecurity Predictions: IoT Security Flaws Awareness Will Be Magnified

This post is part of an ongoing blog series examining “Sure Things” (predictions that are almost guaranteed to happen) and “Long Shots” (predictions that are less likely to happen) in cybersecurity in 2017.  The endpoint security market will experience some dramatic shifts in 2017. Everything from the disposition of the threat actors to the players in the security vendor space to the nature of endpoints is undergoing significant changes. This will most certainly catch many organizations off guard. But there are options for those security professionals who care to prepare …

Michael Moshiri,
  • 0
  • 0

2017 Cybersecurity Predictions: The Year We Get Serious About IoT Security

This post is part of an ongoing blog series examining “Sure Things” (predictions that are almost guaranteed to happen) and “Long Shots” (predictions that are less likely to happen) in cybersecurity in 2017.  Throughout 2016, cybersecurity moved more into the public eye than ever before. Hacks into the Democratic National Committee, BitFinex, Yahoo, Dropbox, LinkedIn, and Verizon were just a few of the high-profile security breaches that grabbed headlines this year. With 2017 fast approaching, we expect that we’ll continue to see breaches in the news. Let’s look at some …

Zoltan DeakJoerg Sieber,
  • 0
  • 0

2017 Cybersecurity Predictions: Financial Sector Attackers Exploit Cracks in Blockchain Technology

This post is part of an ongoing blog series examining “Sure Things” (predictions that are almost guaranteed to happen) and “Long Shots” (predictions that are less likely to happen) in cybersecurity in 2017.   This year saw some notable cybersecurity events in the financial services industry, including thefts from a number of SWIFT (Society for Worldwide Interbank Financial Telecommunication) member banks and from malware-infected ATMs in Asia. As we look ahead to 2017, I predict that we’ll see the following cybersecurity trends in the financial services industry. Sure Things Growing …

Lawrence Chin,
  • 0
  • 14

PAN-OS 8.0 Syn Data Payload Protection

This article highlights a new capability or feature introduced in PAN-OS 8.0. If you’d like to learn more about this topic or PAN-OS 8.0 in-general, you’ll also want to check out our world-class Technical Documentation.   The Syn Data Payload Protection enhancement will provide administrators the option to enable or disable

reaper,
  • 0
  • 0

Error generating the api key

Hey,   we started to use the MT verison 3.3.14 and our firewalls and the panorama running on version 7.0.11   Now i would like to add the Panorama to the tool, but if i try to add id i get always the "Error generating the api key", is there

dschuler,
  • 0
  • 1
Displaying 2611 to 2640 of 10485