New App-IDs for December 2018

by Wednesday - last edited Thursday by (171 Views)

Palo Alto Networks releases new App-IDs every third Tuesday of the month. Take a look at the list of new applications to be released December 18 and decide if you need to update your security policies. 


Unit 42: Don't Panic! Measuring Cybersecurity Risk

by 2 weeks ago - last edited Thursday by (780 Views)

The Palo Alto Networks threat intelligence team, Unit 42, continues with their podcasts! This specific episode covers measuring risk in cybersecurity.







New Magnifier June 2018 Features

by on ‎06-21-2018 08:42 AM - last edited on ‎06-22-2018 05:12 PM by (6,927 Views)

The latest Magnifier maintenance release came out with some interesting new features, including an enhanced search function, User-Id association, UI time display, and more. Read all about it here.


Phishing more popular than ever!

by on ‎06-19-2018 06:44 AM - last edited on ‎07-24-2018 11:13 AM by (15,471 Views)

Phishing cyberattacks are on the rise. How are you protected on a phishing expedition?


New tactics and tools used by Sofacy Group

by ‎06-08-2018 02:51 AM - edited ‎06-08-2018 09:07 AM (4,411 Views)

Unit 42 wrote an extensive blog on Sofacy Group, a well-known APT. Check out this blog to find out what they're all about and how Palo Alto Networks customers are protected from their attacks!


Magnifier Behavioral Analytics

by ‎02-01-2018 02:52 AM - edited ‎04-13-2018 05:36 AM (12,544 Views)

Use Magnifier to find and stop the stealthiest network threats. Block attacks before the damage is done. Analyze rich network, endpoint and cloud data with machine learning. Identify targeted attacks, malicious insiders and malware. Compare Magnifier with AutoFocus.


UPDATED - Urgent action recommended regarding recent security advisory PAN-SA-2017-0027

by ‎01-07-2018 04:49 PM - edited ‎01-15-2018 10:37 PM (12,627 Views)

Customer Advisory: Urgent action recommended regarding recent security advisory PAN-SA-2017-0027. Click the link to read more on this special advisory recommendation.


UBoatRAT targets East Asia

by ‎12-05-2017 05:33 AM - edited ‎12-05-2017 08:52 AM (4,576 Views)

A new variant of the initial RAT code, called UBoatRAT, targets East Asia. Although still unclear what the exact targets are, Unit 42 believes that the targets are related to the Korean gaming industry.

Read more... – Malware or not?

by neg273 on ‎11-10-2017 02:06 PM - last edited on ‎11-10-2017 05:50 PM by (13,955 Views)

With the sheer amount of malware in the wild, it is hard to know what is real malware and what is not. 

Read about and see why it may -- or may not -- be considered malware.



Ransomware Alert! Bad Rabbit

by ‎10-24-2017 04:14 PM - edited ‎11-15-2017 02:51 PM (6,206 Views)

Ransomware is showing up more frequently. Something we never want to have to deal with. If you want to make sure you are protected when using Palo Alto Network devices, then click to steer clear of the Bad Rabbit.




Unauthorized Coin Mining in the Browser

by Community Manager ‎10-24-2017 06:21 AM - edited ‎11-15-2017 12:25 AM (11,759 Views)

The popularity of CryptoCurrency is on the rise. Mining is more difficult, requiring data centers of dedicated servers to turn a profit. A new mining technique uses the combined computing power of thousands of endpoints that mine through a script run in the browser -- definite potential for abuse.


Ransomware: Upping the Ante

by on ‎09-26-2017 05:15 PM - last edited on ‎09-28-2017 12:39 PM by (6,482 Views)

Attackers have traditionally profited by stealing identities or credit card numbers, then selling them on underground markets. Now cyber attackers are on the hunt for new ways to make a profit. Don't let them profit at your expense.


Traps 4.1 - Expanded protection against ransomware

by ‎09-20-2017 12:02 PM - edited ‎09-20-2017 12:07 PM (9,691 Views)

Traps 4.1. continues to develop our innovative, multi-method prevention approach to endpoint security with a specific focus on preventing ransomware.


Multi-Factor Authentication (MFA) for Aperture

by on ‎08-17-2017 04:21 PM - last edited on ‎08-18-2017 02:06 AM by (6,286 Views)

To further strengthen your security posture, Aperture will support multi-factor authentication (MFA) for all administrator log-ins starting Thursday, August 24, 2017 at 11:00 p.m. Pacific Time. You will then be able to add an additional layer of security by enabling MFA for all administrators.


Petya cyber attack - what's it all about?

by ‎06-28-2017 12:33 AM - edited ‎07-31-2017 02:57 PM (8,898 Views)

Petrwrap/Petya ransomware. A major ransomware attack brings business to a close throughout Europe, in an
infection reminiscent of the WannaCry attack.


Palo Alto Networks protects against WanaCrypt0r and other ransomware attacks

by ‎05-16-2017 09:37 AM - edited ‎05-16-2017 02:00 PM (9,395 Views)

Want to know more about the latest WanaCrypt0r ransomware and ways that Palo Alto Networks can help you defend your network from these attacks? Please click to read more.



New IoT/Linux Malware Targets DVRs, Forms Botnet

by ‎04-06-2017 01:45 AM - edited ‎05-11-2017 09:07 AM (8,417 Views)

Unit 42 identifies a variant of the IoT/Linux botnet "Tsunami". Read about how the "Amnesia" malware is delivered and distributed within the targeted network.


Distributed Denial of Service (DDoS), what can I do to protect myself?

by Community Manager ‎02-15-2017 01:22 AM - edited ‎05-11-2017 08:01 AM (6,233 Views)

This could be you

ddos.gifDDoS illustrated with fish :)


What about Threats? (T is for...)

by ‎02-10-2017 01:27 PM - edited ‎05-11-2017 07:24 AM (3,874 Views)

Are you searching for specific threat information, but cannot find it?  Confused if Palo Alto Networks has coverage for a certain threat? Read more about Palo Alto Networks and our unique and thorough approach to the threat landscape.



New Threat Vault features

by on ‎05-04-2016 02:46 PM - last edited on ‎05-10-2017 10:34 PM by (8,565 Views)

We are proud to announce a new version of Palo Alto Networks Threat Vault. The Threat Vault has been overhauled to include more features and to make it more functionable.




The Kill Chain explained

by EmmaF on ‎04-29-2015 05:26 PM - last edited on ‎05-09-2017 06:00 PM by (8,123 Views)

Hi everyone, check out this Cyber Kill Chain article to learn more about the 7 steps of the kill chain. The article explains how Palo Alto Networks can prevent attacks at the different stages of the kill chain with the threat intelligence cloud, the endpoint, and the next-gen firewall.


Q&A: Rob Downs - Ignite Presenter from Unit 42 Discusses Computer Network Defense and Beyond

by on ‎04-24-2015 09:03 AM - last edited on ‎05-12-2017 10:25 AM by carnould (17,219 Views)

I had the opportunity to attend Ignite 2015 a couple of weeks ago, it was awesome to see 3,000 security professionals gather together to learn more about Palo Alto Networks, answering questions and learning to be more secure in day to day operations.There were so many great breakout sessions that happened...


Detect and Prevent Threats at Every Point

by EmmaF on ‎04-23-2015 04:14 PM - last edited on ‎05-09-2017 05:54 PM by (8,056 Views)

Yesterday at RSA I learned a lot about how Palo Alto Networks can prevent cyber attacks.It was great to see what customers, partners, and other vendors were interested in learning. We had many presentations and demos in the booth yesterday that covered Malware, Mobile Workforce Security, Datacenter ...


Vulnerability Focus: 2015 Verizon Data Breach Investigations Report (DBIR): Insights from Unit 42

by on ‎04-22-2015 01:45 PM - last edited on ‎05-09-2017 05:48 PM by (8,696 Views)

Today I will be introducing a new Community Feature:Vulnerability FocusInside of the Vulnerability Focus, we will be talking about recent Threats or Vulnerabilities that have been discovered. Information that every Security Professional can use to help protect their networks.This week I will be covering...


Unit 42 Uses AutoFocus to Identify Malware Faster

by on ‎04-15-2015 12:19 PM - last edited on ‎05-09-2017 05:40 PM by (6,621 Views)

Every IT professional has to deal with Malware attacks on a day to day basis. They are very disruptive, a nuisance, and can cause damage as well as loss of data.So, when there is something new that is introduced to help IT Professionals do their job, and to be able to stop Malware threats, we tend to...


What is AutoFocus?

by on ‎04-10-2015 03:49 PM - last edited on ‎05-10-2017 04:00 PM by (13,662 Views)

Happy Friday, everyone!I wanted to take a minute and talk about AutoFocus.As you may have heard a new product called AutoFocus was announced at Ignite 2015 last week, but not a lot of information has been released about it yet.AutoFocus is a brand new threat intelligence platform only from Palo Alto...


FINDPOS: New POS Malware Family Discovered

by on ‎03-25-2015 10:05 PM - last edited on ‎05-09-2017 05:32 PM by (25,532 Views)

This is article was originally posted by Unit 42 author, Josh Grunzweig.Unit 42 has discovered a new Point of Sale (POS) malware family, which includes multiple variants created as early as November 2014. Over the past few weeks we have been analyzing this malware family, which we have dubbed ‘FindPOS...


Palo Alto Networks Researcher Identifies Critical Internet Explorer Vulnerability

by EmmaF on ‎03-11-2015 04:41 PM - last edited on ‎05-09-2017 04:25 PM by (5,666 Views)

Posted by Ryan Olson on March 10, 2015Palo Alto Networks researcher Bo Qu discovered a new critical Internet Explorer (IE) vulnerability affecting IE versions 8, 9, 10 and 11. This is included in Microsoft’s March 2015 Security Bulletin MS15-018 and MS15-019, and documented in Microsoft Security Bulletin...


FREAK vulnerability/PAN-OS support for "export" level cypher suites

by EmmaF on ‎03-04-2015 01:43 PM - last edited on ‎05-09-2017 04:22 PM by (8,070 Views)

The latest MiM SSL/TLS vulnerability was in the news on Tuesday, March 3rd: have confirmed that...


Examining The Cybercrime Underground, Part 1: Crypters

by on ‎02-24-2015 07:35 AM - last edited on ‎05-09-2017 04:16 PM by (29,710 Views)

This is article was originally posted by Unit 42 author, Tomar BarThis post is the first in a new series titled "Examining the Cybercrime Underground". Each post will delve into different aspects of how cybercriminals operate, using current examples of tools and techniques. 


Ask Questions Get Answers Join the Live Community