bykiwi02-01-201802:52 AM - edited 04-13-201805:36 AM
Use Magnifier to find and stop the stealthiest network threats. Block attacks before the damage is done. Analyze rich network, endpoint and cloud data with machine learning. Identify targeted attacks, malicious insiders and malware. Compare Magnifier with AutoFocus.
bykiwi12-05-201705:33 AM - edited 12-05-201708:52 AM
A new variant of the initial RAT code, called UBoatRAT, targets East Asia. Although still unclear what the exact targets are, Unit 42 believes that the targets are related to the Korean gaming industry.
Ransomware is showing up more frequently. Something we never want to have to deal with. If you want to make sure you are protected when using Palo Alto Network devices, then click to steer clear of the Bad Rabbit.
byreaper10-24-201706:21 AM - edited 11-15-201712:25 AM
The popularity of CryptoCurrency is on the rise. Mining is more difficult, requiring data centers of dedicated servers to turn a profit. A new mining technique uses the combined computing power of thousands of endpoints that mine through a script run in the browser -- definite potential for abuse.
on 09-26-201705:15 PM - last edited on 09-28-201712:39 PM by editeur
Attackers have traditionally profited by stealing identities or credit card numbers, then selling them on underground markets. Now cyber attackers are on the hunt for new ways to make a profit. Don't let them profit at your expense.
on 08-17-201704:21 PM - last edited on 08-18-201702:06 AM by editeur
To further strengthen your security posture, Aperture will support multi-factor authentication (MFA) for all administrator log-ins starting Thursday, August 24, 2017 at 11:00 p.m. Pacific Time. You will then be able to add an additional layer of security by enabling MFA for all administrators.
byjdelio02-10-201701:27 PM - edited 05-11-201707:24 AM
Are you searching for specific threat information, but cannot find it? Confused if Palo Alto Networks has coverage for a certain threat? Read more about Palo Alto Networks and our unique and thorough approach to the threat landscape.
on 04-29-201505:26 PM - last edited on 05-09-201706:00 PM by editeur
Hi everyone, check out this Cyber Kill Chain article to learn more about the 7 steps of the kill chain. The article explains how Palo Alto Networks can prevent attacks at the different stages of the kill chain with the threat intelligence cloud, the endpoint, and the next-gen firewall.
on 04-24-201509:03 AM - last edited on 05-12-201710:25 AM by carnould
I had the opportunity to attend Ignite 2015 a couple of weeks ago, it was awesome to see 3,000 security professionals gather together to learn more about Palo Alto Networks, answering questions and learning to be more secure in day to day operations.There were so many great breakout sessions that happened...
on 04-23-201504:14 PM - last edited on 05-09-201705:54 PM by editeur
Yesterday at RSA I learned a lot about how Palo Alto Networks can prevent cyber attacks.It was great to see what customers, partners, and other vendors were interested in learning. We had many presentations and demos in the booth yesterday that covered Malware, Mobile Workforce Security, Datacenter ...
on 04-22-201501:45 PM - last edited on 05-09-201705:48 PM by editeur
Today I will be introducing a new Community Feature:Vulnerability FocusInside of the Vulnerability Focus, we will be talking about recent Threats or Vulnerabilities that have been discovered. Information that every Security Professional can use to help protect their networks.This week I will be covering...
on 04-15-201512:19 PM - last edited on 05-09-201705:40 PM by editeur
Every IT professional has to deal with Malware attacks on a day to day basis. They are very disruptive, a nuisance, and can cause damage as well as loss of data.So, when there is something new that is introduced to help IT Professionals do their job, and to be able to stop Malware threats, we tend to...
on 03-25-201510:05 PM - last edited on 05-09-201705:32 PM by editeur
This is article was originally posted by Unit 42 author, Josh Grunzweig.Unit 42 has discovered a new Point of Sale (POS) malware family, which includes multiple variants created as early as November 2014. Over the past few weeks we have been analyzing this malware family, which we have dubbed ‘FindPOS...