New capabilities in Traps 4.1 monitor ransomware behavior and upon detection, shut down an attack and block new exploit techniques. Palo Alto Networks has created applications to identify Tor connections and block Tor application traffic on your network. Malware vs exploits --the differences between the two attack vectors to an endpoint and how each attack, if successful, is used to compromise an endpoint. Visit our YouTube channel for this and other points of clarification. Follow us on Twitter. Learn, share, and connect in the Live Community.