<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic GameOver Zeus in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/gameover-zeus/m-p/12809#M9386</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does PaloAlto provide any protection against this malware, either in downloading the virus, making the DNS quesries to the list of .ru domains that the FBI released on June 4th, or in the call backs that it makes? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 05 Jun 2014 21:13:27 GMT</pubDate>
    <dc:creator>IanJohnston</dc:creator>
    <dc:date>2014-06-05T21:13:27Z</dc:date>
    <item>
      <title>GameOver Zeus</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/gameover-zeus/m-p/12809#M9386</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does PaloAlto provide any protection against this malware, either in downloading the virus, making the DNS quesries to the list of .ru domains that the FBI released on June 4th, or in the call backs that it makes? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2014 21:13:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/gameover-zeus/m-p/12809#M9386</guid>
      <dc:creator>IanJohnston</dc:creator>
      <dc:date>2014-06-05T21:13:27Z</dc:date>
    </item>
    <item>
      <title>Re: GameOver Zeus</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/gameover-zeus/m-p/12810#M9387</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Ian,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gameover &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;ZeuS&lt;/SPAN&gt; is a peer-to-peer &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;botnet&lt;/SPAN&gt; based on components from the earlier &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;ZeuS&lt;/SPAN&gt; trojan. PAN already has coverage &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;for&lt;/SPAN&gt; this issue with the Spyware DNS signatures. Please make sure that you have enabled DNS signatures under the Spyware tab and have &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;action&lt;/SPAN&gt; set to block.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jun 2014 15:32:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/gameover-zeus/m-p/12810#M9387</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-06-12T15:32:38Z</dc:date>
    </item>
    <item>
      <title>Re: GameOver Zeus</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/gameover-zeus/m-p/12811#M9388</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have seen a few instances were emails with the malicious EXE are coming through a SSL connection to Dropbox. Might want to make sure you're decrypting SSL to dropbox.com, but the downside is you lose the ability to use the Dropbox client.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jun 2014 19:04:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/gameover-zeus/m-p/12811#M9388</guid>
      <dc:creator>mharding</dc:creator>
      <dc:date>2014-06-12T19:04:47Z</dc:date>
    </item>
  </channel>
</rss>

