Community Blog

What's New: Traps 6.0

by dmilrad on ‎02-26-2019 06:00 AM - last edited 4 weeks ago by (2,325 Views)

The latest release of Traps 6.0 extends the protection capabilities to protect endpoints across the most complete spectrum of threats.

Graphic banner for traps 6.0


DarkHydrus Adds Google Drive Support to Its RogueRobin Trojan for C2 Communications!

by on ‎01-21-2019 04:09 AM - last edited on ‎02-11-2019 09:49 AM by (722 Views)

The APT-group DarkHydrus has been busy with a new variant of the RogueRobin Trojan. See what it's about and how to stay protected!




New Unit 42 Threat Intelligence Portal

by on ‎12-19-2018 01:23 AM - last edited on ‎12-26-2018 08:34 AM by (850 Views)

Designed with a fresh new look and user-friendly navigation, visitors now have easy access to the latest research, reports, adversary playbooks, and podcasts from Unit 42.



The Latest App-IDs

by ‎12-12-2018 02:02 PM - edited ‎02-14-2019 06:59 AM (1,021 Views)

Palo Alto Networks releases new App-IDs every third Tuesday of the month. Take a look and decide if you need to update your security policies. 


Unit 42: Don't Panic! Measuring Cybersecurity Risk

by on ‎12-04-2018 03:57 AM - last edited on ‎12-26-2018 08:37 AM by (1,349 Views)

The Palo Alto Networks threat intelligence team, Unit 42, continues with their podcasts! This specific episode covers measuring risk in cybersecurity.




New Magnifier June 2018 Features

by on ‎06-21-2018 08:42 AM - last edited on ‎06-22-2018 05:12 PM by (7,399 Views)

The latest Magnifier maintenance release came out with some interesting new features, including an enhanced search function, User-Id association, UI time display, and more. Read all about it here.


Phishing more popular than ever!

by on ‎06-19-2018 06:44 AM - last edited on ‎07-24-2018 11:13 AM by (15,947 Views)

Phishing cyberattacks are on the rise. How are you protected on a phishing expedition?


New tactics and tools used by Sofacy Group

by ‎06-08-2018 02:51 AM - edited ‎06-08-2018 09:07 AM (4,842 Views)

Unit 42 wrote an extensive blog on Sofacy Group, a well-known APT. Check out this blog to find out what they're all about and how Palo Alto Networks customers are protected from their attacks!


Magnifier Behavioral Analytics

by ‎02-01-2018 02:52 AM - edited ‎04-13-2018 05:36 AM (13,211 Views)

Use Magnifier to find and stop the stealthiest network threats. Block attacks before the damage is done. Analyze rich network, endpoint and cloud data with machine learning. Identify targeted attacks, malicious insiders and malware. Compare Magnifier with AutoFocus.


UPDATED - Urgent action recommended regarding recent security advisory PAN-SA-2017-0027

by ‎01-07-2018 04:49 PM - edited ‎01-15-2018 10:37 PM (13,246 Views)

Customer Advisory: Urgent action recommended regarding recent security advisory PAN-SA-2017-0027. Click the link to read more on this special advisory recommendation.


UBoatRAT targets East Asia

by ‎12-05-2017 05:33 AM - edited ‎12-05-2017 08:52 AM (4,805 Views)

A new variant of the initial RAT code, called UBoatRAT, targets East Asia. Although still unclear what the exact targets are, Unit 42 believes that the targets are related to the Korean gaming industry.

Read more... – Malware or not?

by neg273 on ‎11-10-2017 02:06 PM - last edited on ‎11-10-2017 05:50 PM by (14,568 Views)

With the sheer amount of malware in the wild, it is hard to know what is real malware and what is not. 

Read about and see why it may -- or may not -- be considered malware.



Ransomware Alert! Bad Rabbit

by ‎10-24-2017 04:14 PM - edited ‎11-15-2017 02:51 PM (6,485 Views)

Ransomware is showing up more frequently. Something we never want to have to deal with. If you want to make sure you are protected when using Palo Alto Network devices, then click to steer clear of the Bad Rabbit.




Unauthorized Coin Mining in the Browser

by Community Manager ‎10-24-2017 06:21 AM - edited ‎11-15-2017 12:25 AM (12,218 Views)

The popularity of CryptoCurrency is on the rise. Mining is more difficult, requiring data centers of dedicated servers to turn a profit. A new mining technique uses the combined computing power of thousands of endpoints that mine through a script run in the browser -- definite potential for abuse.


Ransomware: Upping the Ante

by on ‎09-26-2017 05:15 PM - last edited on ‎09-28-2017 12:39 PM by (6,709 Views)

Attackers have traditionally profited by stealing identities or credit card numbers, then selling them on underground markets. Now cyber attackers are on the hunt for new ways to make a profit. Don't let them profit at your expense.


Traps 4.1 - Expanded protection against ransomware

by ‎09-20-2017 12:02 PM - edited ‎09-20-2017 12:07 PM (9,971 Views)

Traps 4.1. continues to develop our innovative, multi-method prevention approach to endpoint security with a specific focus on preventing ransomware.


Multi-Factor Authentication (MFA) for Aperture

by on ‎08-17-2017 04:21 PM - last edited on ‎08-18-2017 02:06 AM by (6,599 Views)

To further strengthen your security posture, Aperture will support multi-factor authentication (MFA) for all administrator log-ins starting Thursday, August 24, 2017 at 11:00 p.m. Pacific Time. You will then be able to add an additional layer of security by enabling MFA for all administrators.


Petya cyber attack - what's it all about?

by ‎06-28-2017 12:33 AM - edited ‎07-31-2017 02:57 PM (9,077 Views)

Petrwrap/Petya ransomware. A major ransomware attack brings business to a close throughout Europe, in an
infection reminiscent of the WannaCry attack.


Palo Alto Networks protects against WanaCrypt0r and other ransomware attacks

by ‎05-16-2017 09:37 AM - edited ‎05-16-2017 02:00 PM (9,929 Views)

Want to know more about the latest WanaCrypt0r ransomware and ways that Palo Alto Networks can help you defend your network from these attacks? Please click to read more.



New IoT/Linux Malware Targets DVRs, Forms Botnet

by ‎04-06-2017 01:45 AM - edited ‎05-11-2017 09:07 AM (8,688 Views)

Unit 42 identifies a variant of the IoT/Linux botnet "Tsunami". Read about how the "Amnesia" malware is delivered and distributed within the targeted network.


Distributed Denial of Service (DDoS), what can I do to protect myself?

by Community Manager ‎02-15-2017 01:22 AM - edited ‎05-11-2017 08:01 AM (7,808 Views)

This could be you

ddos.gifDDoS illustrated with fish :)


What about Threats? (T is for...)

by ‎02-10-2017 01:27 PM - edited ‎05-11-2017 07:24 AM (4,084 Views)

Are you searching for specific threat information, but cannot find it?  Confused if Palo Alto Networks has coverage for a certain threat? Read more about Palo Alto Networks and our unique and thorough approach to the threat landscape.



New Threat Vault features

by on ‎05-04-2016 02:46 PM - last edited on ‎05-10-2017 10:34 PM by (9,191 Views)

We are proud to announce a new version of Palo Alto Networks Threat Vault. The Threat Vault has been overhauled to include more features and to make it more functionable.




The Kill Chain explained

by EmmaF on ‎04-29-2015 05:26 PM - last edited on ‎05-09-2017 06:00 PM by (8,409 Views)

Hi everyone, check out this Cyber Kill Chain article to learn more about the 7 steps of the kill chain. The article explains how Palo Alto Networks can prevent attacks at the different stages of the kill chain with the threat intelligence cloud, the endpoint, and the next-gen firewall.


Q&A: Rob Downs - Ignite Presenter from Unit 42 Discusses Computer Network Defense and Beyond

by on ‎04-24-2015 09:03 AM - last edited on ‎05-12-2017 10:25 AM by carnould (17,592 Views)

I had the opportunity to attend Ignite 2015 a couple of weeks ago, it was awesome to see 3,000 security professionals gather together to learn more about Palo Alto Networks, answering questions and learning to be more secure in day to day operations.There were so many great breakout sessions that happened...


Detect and Prevent Threats at Every Point

by EmmaF on ‎04-23-2015 04:14 PM - last edited on ‎05-09-2017 05:54 PM by (8,308 Views)

Yesterday at RSA I learned a lot about how Palo Alto Networks can prevent cyber attacks.It was great to see what customers, partners, and other vendors were interested in learning. We had many presentations and demos in the booth yesterday that covered Malware, Mobile Workforce Security, Datacenter ...


Vulnerability Focus: 2015 Verizon Data Breach Investigations Report (DBIR): Insights from Unit 42

by on ‎04-22-2015 01:45 PM - last edited on ‎05-09-2017 05:48 PM by (8,892 Views)

Today I will be introducing a new Community Feature:Vulnerability FocusInside of the Vulnerability Focus, we will be talking about recent Threats or Vulnerabilities that have been discovered. Information that every Security Professional can use to help protect their networks.This week I will be covering...


Unit 42 Uses AutoFocus to Identify Malware Faster

by on ‎04-15-2015 12:19 PM - last edited on ‎05-09-2017 05:40 PM by (6,863 Views)

Every IT professional has to deal with Malware attacks on a day to day basis. They are very disruptive, a nuisance, and can cause damage as well as loss of data.So, when there is something new that is introduced to help IT Professionals do their job, and to be able to stop Malware threats, we tend to...


What is AutoFocus?

by on ‎04-10-2015 03:49 PM - last edited on ‎02-28-2019 03:02 PM by (14,413 Views)

Read about the introduction to AutoFocus. The release of AutoFocus was announced at Ignite 2015. AutoFocus is a brand new threat intelligence platform only from Palo Alto Networks.


FINDPOS: New POS Malware Family Discovered

by on ‎03-25-2015 10:05 PM - last edited on ‎05-09-2017 05:32 PM by (25,881 Views)

This is article was originally posted by Unit 42 author, Josh Grunzweig.Unit 42 has discovered a new Point of Sale (POS) malware family, which includes multiple variants created as early as November 2014. Over the past few weeks we have been analyzing this malware family, which we have dubbed ‘FindPOS...


Ask Questions Get Answers Join the Live Community