Date

By Source

By Technology

By Services

By Audience

Displaying 31 to 60 of 10082

How to make a passive miner

How would one create a miner that listenes for data instead of actively retrieve it ? (For example a miner that serves a rest endpoint so another application can send data to it)

KristianGa,
  • 0
  • 5

Secure Your OT: Introducing Our New ICS Cybersecurity Hands-on Workshop

Secure your OT: introducing our New ICS cybersecurity hands-on workshop.

Del Rodillas,
  • 0
  • 1

5 Ways Endpoint Security and Network Security Should Work Together

This brief discusses the five things an endpoint security solution should do to prevent negatively impacting your network security posture.

  • 2
  • 107

Intergrading Minemeld into McAfee ESM SIEM

My name is john , i am quite new to Minemeld but i am also using McAfee ESM . can anyone teach me step by step , on how i can intergradeMinemeld into SIEM ? i hope to hearfrom you guys  soon. with regards, John

john_chua,
  • 0
  • 2

LiveWeek 8 Dec 2017

NEW!! DISCUSSION OF THE WEEK (DOTW) DotW: Autolock  Several admins making changes at the same time can result in half-completed adjustments getting committed to an active device. This happens more than you might expect, but there is a solution!   NEW!! UNIT 42  UBoatRAT targets East Asia A new variant

editeur,
  • 0
  • 0

Minemeld PA syslog processing

Hi,   I installed Minemeld. I'm now trying to mine the PA traffic logs via syslog. It seems that the processing works but no indicators are extracted? The PA is running 7.1.13 and sending the syslog messages on TCP port 13514 to the Minemeld server. I already looked into the

jorisVD,
  • 0
  • 2

Palo Alto Networks News of the Week: December 9, 2017

Enjoy all the top Palo Alto Networks news of the week.

Justin Hall,
  • 0
  • 0

Channels Scoop: December 8, 2017

Dig into this week's NextWave Partner Channel Scoop.

Roxanne Edwards,
  • 0
  • 3

Accelerating Security Innovation: Introducing the Palo Alto Networks Application Framework

Accelerating security innovation: introducing the Palo Alto Networks application framework.

Scott Simkin,
  • 0
  • 14

Cyber Soldiers: White-Hat Hackers

Since 2015, almost all healthcare organizations have reported at least one cyberattack. The largest U.S. hospital attacked in the U.S. 2017 was Erie County Medical Center in Buffalo, New York, and they’re still feeling the effects. Dr. Jennifer Pugh runs their emergency room and she was on staff the morning the hackers infiltrated their system, sending a ransomware note demanding...

  • 0
  • 4

2018 Predictions & Recommendations: Horizon Scanning in EMEA for 2018 and Beyond

2018 predictions and recommendations: horizon scanning in EMEA for 2018 and beyond.

Greg Day,
  • 0
  • 1

Threat Brief: Unauthorized Coin Mining – A New Threat Facing Shoppers and Retailers This Holiday Season

Threat Brief: unauthorized coin mining – a new threat facing shoppers and retailers this holiday season.

Christopher Budd,
  • 0
  • 9

The Twelve Joys of Aperture

1. Gmail (Beta) You can now add Gmail for business to the Aperture service. The service applies policy and performs deep content inspection of Gmail messages and attachments to detect zero-day attacks, malware, and data exfiltration so you can view more information about the incident and decide if the activity

pwatkins,
  • 0
  • 0

Building a Scalable GlobalProtect Deployment

Protect your mobile workforce and network from internet-borne threats with a scalable GlobalProtect deployment.

  • 0
  • 384

Spam campaign uses fake tickets to infect PCs of Brazilians with malware

Using fake tickets to distribute malware, criminals can steal data from victims' computers, including passwords and usernames; called "Boleto Mestre", about 261,098 e-mails have already been distributed since June

  • 0
  • 20

Spam campaign uses fake tickets to infect PCs of Brazilians with malware

Unit 42, the Palo Alto Networks research unit, has identified a malspam (malicious spam) campaign specially developed to affect Brazilian victims. Using fake tickets to distribute malware, criminals can steal data from victims' computers, including passwords and usernames.

  • 0
  • 23

CRN's 2017 Products Of The Year

Recent updates as part of Palo Alto Networks' PAN-OS 8.0 adds upgrades across cloud security, multi-method threat prevention, management at scale, credential threat prevention, and integrations with complementary vendors.

  • 0
  • 49

False tickets serve as bait to contaminate PCs with viruses

The security company Palo Alto Networks announced on Thursday (7) an alert about a coup that circulates in Brazil using fake tickets. In a criminal campaign monitored by the company, more than 260,000 emails have been sent since June 2017. Whoever falls in the coup and tries to open the tickets ends up having the computer infected with a digital plague that steals information, including passwords.

  • 0
  • 22

Talos Blacklist

I am trying to create a miner/processor/output nodes for the talos black list ( https://talosintelligence.com/documents/ip-blacklist ) and am failing. Has anyone got this to work?

Hal_Blum,
  • 0
  • 4

Protocol Protection Layer 2 or Vwire

My question would it be important to add protocol protection  in Zone Protection if you are running layer 2 or vwire on you palo alto fiewalll? and if so should it be placed  on untrust or trust or both?

AndyYerger,
  • 0
  • 3

Connecting PAN-OS to MineMeld using External Dynamic Lists

One of the most common use cases for MineMeld is generating feeds to be used on PAN-OS as External Dynamic Lists. Using the MineMeld powerful engine, you can create External Dynamic Lists to track on AutoFocus the IP addresses, URLs and domains used by ransomware, known APT groups and active malware campaigns.

lmori,
  • 0
  • 2

Good Cyber-Insurance Sense Is At a Premium Today

If there’s an inconvenient truth in today’s world, it’s that risky business is the new normal. According to Ponemon Institute, the average cost of a data breach now stands at $3.62 million. Attempted intrusions are up 27 percent annually, and the overall costs associated with cybersecurity are rising 23 percent a year. Quite logically, many organizations have turned to cyber...

Sam Greengard,
  • 0
  • 1

Happy Holidays! You’ve Been Hacked!

Businesses of every shape and size must be particularly vigilant during the holiday season. Scammers and cybercriminals rely on increasingly sophisticated methods to dupe employees and gain control of enterprise networks. They constantly probe for weaknesses and take advantage of gaps in security. “The more sophisticated bad actors target companies during the holiday season,” stated Anthony Dagostino, global head of...

Sam Greengard,
  • 0
  • 3

Understanding the Automator’s Dilemma in Security

Stuart Borgman helps us understand the automator's dilemma in security.

Stuart Borgman,
  • 0
  • 5

Downeks and Quasar RAT Used in Recent Targeted Attacks Against Governments

Downeks and Quasar RAT used in recent targeted attacks against governments. Get the full report from Unit 42.

Mashav SapirTomer BarNetanel RimerTaras MalivanchukYaron SamuelSimon Conant,
  • 0
  • 5

Navigating Cybersecurity Challenges in Financial Services

Download the whitepaper to read more about how our next-generation security approach is better able to protect the highly targeted financial services industry.

  • 0
  • 72

Government Use Case: Network Security Consolidation

Reduce network security costs and complexity by consolidating multiple security point products into one platform

  • 0
  • 98

Changing SSL Certificate on the MineMeld Docker container

Team,   Does anyone have some guidance on changing out the SSL certificates on the MineMeld Docker container? Should we modify the dockerfile to include a COPY command? Is there a way to just shunt it in via mapping an additional VOLUME during the "docker run"?   Thanks again for

nbilal,
  • 0
  • 3

Guarding against the next cyber attack

Army veteran and cyber security expert Rick Howard talks to the FT's Hannah Kuchler about the current state of cyber security, what we have learned from recent large-scale attacks known as WannaCry and NotPetya and what companies can do to try to guard against the next attack. 

  • 0
  • 37

Get Output without a Local Firewall

My customer has the migration tool running locally on his laptop but is not on the same subnet where the PA firewall is connected--resulting in the PA-820 that he needs to migrate to not being seen. He wants to convert and migrate/push a ssg140 configuration into PAN-OS. Is there a

jhooker,
  • 0
  • 3
Displaying 31 to 60 of 10082