Date

Education and Professional Services

Displaying 3031 to 3060 of 4017

How the role of the CSO is changing

  • 0
  • 994

Palo Alto Networks Expands Global Distribution Agreement with Westcon Group

Palo Alto Networks® (NYSE: PANW), the leader in enterprise security, and Westcon Group, the value-added distributor of security, unified communications, network infrastructure, and data center solutions, today announced that the companies have expanded their global distribution agreement.
Santa Clara, CA and Tarrytown, NY
  • 0
  • 1354

Examining the CHS Breach and Heartbleed Exploitation

Yesterday, TrustedSec, a security consultancy based on Ohio, wrote that the recent breach at Community Health Systems (CHS) was the result of exploitation of the Heartbleed OpenSSL vulnerability (CVE-2014-0160). CHS’s 8-K filing on Monday did not reveal how the attackers got into their network, only that the records of approximately 4.5 million patients were stolen in
Ryan Olson,
  • 0

Palo Alto Networks Unveils Security Risks in Android Internal Storage

Palo Alto Networks® (NYSE: PANW), the leader in enterprise security, today presented new research highlighting security risks in the internal storage used by applications on Google Android devices. More than 94 percent of popular Android applications are potentially vulnerable.
Santa Clara, CA
  • 0
  • 845

Insecure Internal Storage in Android

Today, Palo Alto Networks researcher Claud Xiao is delivering a presentation titled “Insecure Internal Storage in Android” at the Hacks in Taiwan Conference (HITCON). Claud is discussing techniques for accessing private data in Android’s internal storage system using the Android Debug Bridge (ADB) backup/restore functionality. While over 85% of active Android devices are vulnerable to
Claud Xiao,
  • 0

Palo Alto Networks Discovers 3 Critical Internet Explorer Vulnerabilities

Palo Alto Networks researchers discovered 3 new critical Internet Explorer (IE) vulnerabilities covering IE versions 8, 9, 10 and 11. Each of these discoveries allows full remote code execution using a memory corruption vulnerability in IE. They have been documented in Microsoft Security Bulletin MS14-051and part of the August 2014 Security Bulletin. Palo Alto Networks researcher Bo
Ryan Olson,
  • 0

Attacks on East Asia using Google Code for Command and Control

Recently, FireEye published a blog titled “Operation Poisoned Hurricane” which detailed the use of PlugX malware variants signed with legitimate certificates that used Google Code project pages for command and control (C2). We were able to uncover multiple additional samples exploiting the same technique as well as an additional Google Code account with multiple projects
Jen Miller-Osborn,
  • 0

Hunting the Mutex

Summary Mutex analysis is an often overlooked and useful tool for malware author fingerprinting, family classification, and even discovery. Far from the hypothesized “huge amount of variability” in mutex names, likely hypothesized due to the seemingly random appearance of them, practical mutex usage is embarrassingly consistent. In fact, over 15% of all collected worms share
Palo Alto Networks,
  • 0

Federal CDM Video Series - Part 2

Steve Hoffman, Vice President of Sales for Palo Alto Networks Federal Josh Canary, Account General Manager for CSC - Department of Homeland Security, MPPD, and more importantly the CDM program. In this segment, Palo Alto Networks and CSC discuss Continuous Diagnostic and Mitigation (CDM) and the importance of an integrated platform to improve response times to zero days and APTs.
  • 0
  • 449

Federal CDM Video Series - Part 1

Steve Hoffman, Vice President of Sales for Palo Alto Networks Federal Josh Canary, Account General Manager for CSC - Department of Homeland Security, MPPD, and more importantly the CDM program. In this segment, Palo Alto Networks and CSC discuss Continuous Diagnostic and Mitigation (CDM) requirements and how Palo Alto Networks and CSC work together to meet them.
  • 0
  • 580

Federal CDM Video Series - Part 3

Steve Hoffman, Vice President of Sales for Palo Alto Networks Federal Josh Canary, Account General Manager for CSC - Department of Homeland Security, MPPD, and more importantly the CDM program. In this segment, Palo Alto Networks and CSC discuss how Continuous and Diagnostic Mitigation (CDM) relates to the existing Einstein program.
  • 0
  • 392

Thwarting APTs: Threat Visibility for Government Networks

Read about the Palo Alto Networks enterprise security platform, which prevents all known file types from traversing government networks in-line.
  • 1
  • 508

Defense in Depth: 5 Imperatives for Governments to Defeat APTs

Defense in Depth does not mean more security tools. The key to thwarting advanced attacks in today’s government networks is to reduce the attack surface to increase visibility to what matters: the anomalies in your network, across the kill chain.
  • 0
  • 569

Check Out Scenes from Palo Alto Networks at Black Hat 2014

From a well-attended session on our advanced endpoint protection, to the buzz at the booth for Unit 42, our threat intelligence team, and a full slate of demonstrations and visualizations, there was plenty to take in at a very busy Black Hat USA. Here’s a look back at Palo Alto Networks at Black Hat:
Chad Berndtson,
  • 0

IT FinanzMagazin

  • 0
  • 860

Palo Alto Networks Solution Assurance Services Datasheet

Overview of Solution Assurance Services options available to you.
  • 1
  • 1572

Palo Alto Networks Education Services Datasheet

Overview of Education Services options available to you.
  • 5
  • 4434

Black Hat 2014: Threat Intelligence With an Emphasis On Context

A few weeks ago we formally introduced Unit 42, the new threat intelligence team at Palo Alto Networks. Following the release Unit 42’s inaugural research paper, 419 Evolution, many of the team leads are on the scene here at Black Hat 2014 in Las Vegas. It’s a chance for the security community at large to
Chad Berndtson,
  • 0

Where To Find Palo Alto Networks At Black Hat 2014

Black Hat USA 2014 is taking place all this week in Las Vegas, and as the exhibit halls and many of the briefings open on Wednesday, we invite you to visit with Palo Alto Networks throughout the show. Join us at Booth #227 on Wednesday and Thursday to:
Chad Berndtson,
  • 0

Palo Alto Networks Provides a New Breed of Intelligence to Detect and Prevent

Back in June, Microsoft patched 59 Internet Explorer vulnerabilities and Palo Alto Networks discovered 21 of them, all rated critical. Then in July, we released findings about evolved Nigerian 419 scammers from Unit 42, the new Palo Alto Networks threat intelligence team. The way we perform cybersecurity research is opening the door to a new
Tim Treat,
  • 0

Backoff and Citadel Abuse Remote Access Tools

Recent events continue to highlight the abuse of remote access applications in the enterprise. Last Tuesday, Trusteer reported that a new variant of Citadel, which has long relied on VNC to give attackers remote control over systems, began adding new credentials to systems it infects and enabling the standard Windows remote desktop application (RDP). This
Rob DownsRyan Olson,
  • 0

New Release: Decrypting NetWire C2 Traffic

On July 22, Palo Alto Networks threat intelligence team, Unit 42, released our first report on the evolution of “Silver Spaniel” 419 scammers.  Of particular note is how these actors use a Remote Administration Tool (RAT) named NetWire (part of the NetWiredRC malware family). This RAT gives a remote attacker complete control over a Windows,
Phil Da SilvaRob DownsRyan Olson,
  • 0
Displaying 3031 to 3060 of 4017