LiveWeek 10 Nov 2017

by 2 weeks ago - last edited a week ago (1,190 Views)

COINHIVE.COM – MALWARE OR NOT?

URL FILTERING & OUR SPYWARE SIGNATURE TO THE RESCUE

With the sheer amount of malware in the wild, it is hard to know what is real malware and what is not. Read about Coinhive.com and see if it is considered malware. See what steps you can take to minimize the impact of dubious URLs and subdomains. 

 

UNIT 42: UNAUTHORIZED COIN MINING IN THE BROWSER

COIN MINING - WHO AUTHORIZED THAT?

The popularity of CryptoCurrency is on the rise. Mining is more difficult, requiring data centers of dedicated servers to turn a profit. A new mining technique uses the combined computing power of thousands of endpoints that mine through a script run in the browser. There's great potential for abuse. Protect yourself.

  

GET TUNNEL VISION!

TECH DOCS PRESCRIPTIONS FOR CLARITY IN THE TUNNEL

Pull back the curtain, turn on the light, put on your x-ray vision goggles and inspect the traffic passing through your cleartext tunnels (GRE, non-encrypted IPSec, or GTP-U tunnels). Don’t let your tunneled traffic go unchecked! You want tunnel vision! 

Check out Tunnel Content Inspection in PAN-OS 8.0 and later releases.

 

As the enforcer holding the gavel, you can apply different security rules to the tunnel content versus the rules applied to the inside content.As the enforcer holding the gavel, you can apply different security rules to the tunnel content versus the rules applied to the inside content.

REAPER'S CHALLENGE STANDS!

THAT NICE HOODIE HAS YET TO FIND A HOME!

Reaper's challenge still stands, and that nice, cozy-warm hoodie is yet unclaimed! It could be yours -- easily, too! Show off those hacking skills, or just send us a funny pic or a spoof of your liking and ours. Easy peasy, and it earns you a special badge, fame, recognition and who knows what more? But, remember, you must play to win!

 

LIVE ON YOUTUBE

#GetAnswers | YouTube

3509 subscribers

269,079 views

Live Community YouTube channel

 

Ask your questions about our videos here in the Live Community. Make connections. Share knowledge. Earn badges. Gain fame.

 

AROUND PALO ALTO NETWORKS

Tweets  

LinkedIn/Facebook/Google+ Posts              

  • New Unit 42 research: OilRig threat group deploys “Alma Communicator” DNS Tunneling Trojan http://bit.ly/2AlerFt
  • Customer Spotlight: Telkom Indonesia protects expansion plans with Palo Alto Networks http://bit.ly/2m5OpUx
  • Scott Simkin shares 10 cybersecurity commandments with SecurityWeek http://bit.ly/2m38H0R 

Threat

Customer

Partner

CSO Perspectives

Tech Docs

Regional

Events

Misc

 

THANKS TO OUR CONTRIBUTORS!

@shkelly @neg273@ZoltanD@jdelio@reaper@kiwi

 

 

 

Till next time--

Gail

@editeur

Ask Questions Get Answers Join the Live Community
Top Liked Posts