Date

Education and Professional Services

Displaying 3121 to 3150 of 3979

How Well Do You Understand Your Cyber Adversary? – Part 3

This is the third and final installment of my blog series differentiating the various kinds of cyber adversaries who are looking to gain access to enterprise and government networks. Follow these links to get to Part 1 and Part 2.
Rick Howard,
  • 0

The Latest Kuluoz Spam Campaign Kicks Off

At 06:47 PST on May 20 Palo Alto Networks WildFire detected the start of the latest Kuluoz spam campaign. The total number of e-mails detected quickly rose to over 30,000 per hour around noon PST and had not begun to slow down as of 1:30PM PST.   Kuluoz is a descendant of the Asprox malware
Ryan Olson,
  • 0

How Well Do You Understand Your Cyber Adversary? – Part 2

In my previous post, I wrote of my distaste for how loosely the cybersecurity community uses terms like cyber terrorism and cyber crime.  There are different motivations driving those who would try to gain unauthorized entry into a corporate network. So let’s take a look at who they are and what drives them to do
Rick Howard,
  • 0

Building walls of security logic

  • 0
  • 1079

How Well Do You Understand Your Cyber Adversary? – Part 1

This is a pet peeve of mine, but when I hear somebody from the cybersecurity community refer to a web-defacement as cyber warfare, my soul dies a little. Really? A hacktivist converts the corporate logo on a company web site into a Guy Fawkes mask and it’s cyber warfare? Hardly. A criminal steals customer credit
Rick Howard,
  • 0

Funtasy Trojan Targets Spanish Android Users with Sneaky SMS Charges

Summary A new Android Trojan, named Funtasy, began targeting Spanish Android users in mid-April. Users have downloaded 18 different variants of Funtasy between 13,500 and 67,000 times from the Google Play store. Funtasy currently targets users of multiple Spanish mobile networks, and one Australian mobile network. Funtasy subscribes victim’s phones to premium SMS services which
Zhi XuClaud XiaoRyan Olson,
  • 0

A Tale of 3 Vulnerabilities, CVE-2014-1776 Exploit Linked to Previous Attacks

Summary The exploit code used in the recent CVE-2014-1776 attacks shares many similar characteristics with code that exploited CVE-2014-0322 and CVE-2013-3163. The shared techniques, variable names and code structure suggest these exploits share a common author or template. Palo Alto Networks customers are protected by from exploitation of CVE-2014-1776 with content release 433-2194. Late last
Bo Qu,
  • 0

Palo Alto Networks to Announce Fiscal Third Quarter 2014 Financial Results on Wednesday, May 28, 2014

Palo Alto Networks to Announce Fiscal Third Quarter 2014 Financial Results on Wednesday, May 28, 2014.
Santa Clara, CA
  • 0
  • 272

Palo Alto Networks Protects Customers From Critical IE Vulnerability CVE-2014-1776

Summary Critical vulnerability (CVE-2014-1776) identified in Internet Explorer, with active attacks observed in the wild IE vulnerability could be used to exploit multiple versions of Internet Explorer, including those on Windows-XP based systems, which no longer receive security updates from Microsoft Palo Alto Networks Threat Prevention customers are protected from exploitation of the vulnerability Cyvera endpoint
Scott Simkin,
  • 0

Cardbuyer: New Smart Android Trojan Defeats Multi-factor Verification and Steals Prepaid Game Cards

On April 21st our WildFire analysis cloud detected a new Android Trojan, which is currently completely undetected in VirusTotal and uses a new combination of tactics to make money for the author. Based on the state of the code and the limited distribution we believe we may have detected this malware during a testing phase,
Claud XiaoZhi Xu,
  • 0
Displaying 3121 to 3150 of 3979