Threat Prevention Services

Threat Prevention Services

Don’t let ‘em in! Block threats at the perimeter and protect your network, your assets, and your digital way of life. Palo Alto Networks protects your network against threats by providing multiple layers of prevention, confronting threats at each phase of the attack. We use global threat intelligence through the close integration of threat prevention security services, URL Filtering and WildFire to automatically discover unknown malware and deliver protections. What questions do you have about DNS Sinkhole, malware, file blocking, and more? Bring your questions to the perimeter of LIVEcommunity. Ask, share, learn, and protect.

Threat Prevention Services Discussions

Have questions? Join the Live Community to post your questions and get answers.
Author Topic Views Replies
4 weeks ago

PAN-OS 8.0 Blue team help (In a little over my head)

I joined my schools cyber defense team last week, and subsequently volunteered to manage the firewall (Palo Alto VM version 8.0.0). I was supposed to ...

posted in Threat & Vulnerability Discussions

400 2
a month ago

Reconnaissance Protection tresholds

Hello there, I am in the process of configuring our reconnaissance protection profile and need some advice on best practices for interval and tre...

posted in Threat & Vulnerability Discussions

214 0
11-08-2019

Masscan Port Scanning Tool Detection'

I am getting this alert Masscan Port Scanning Tool Detection' what can I do that will stop the scanning, I would think I would need to do more th...

posted in Threat & Vulnerability Discussions

602 3
11-03-2019

Downloading TMS On-Prem Broker VM

How long i need to wait until i can download On-Prem Broker VM on Support Portal Software Update after activating TMS service on HUBbecause until now ...

posted in Threat & Vulnerability Discussions

440 1
10-31-2019

IPS detects HTML SQL Injection attempt (35827) only after WebServer returns 302 on original request

During an event investigation, noticed the following behavior: Attacker sends SQL injection request to WebServer (that sits behind a Palo-Alto).W...

posted in Threat & Vulnerability Discussions

323 1

Threat Prevention Services Blogs

Hide N Seek Botnet Return

Jun 14, 2019 — Hide 'N Seek adds to its menacing malware family.

1187 3 by in Blogs

New IoT/Linux Malware Targets DVRs, Forms Botnet

Apr 6, 2017

Unit 42 identifies a variant of the IoT/Linux botnet "Tsunami". Read about how the "Amnesia" malware is delivered and distributed within the targeted network.

9391 2 by in Blogs

When Scripts Attacks, WildFire Protects

Jan 14, 2019 — Cyberattackers look for fast and easy ways to steal your data. Among many techniques in their playbooks, using scripts is a quickly growing trend. Why? It...

2719 4 by in Blogs

Petya cyber attack - what's it all about?

Jun 28, 2017

Petrwrap/Petya ransomware. A major ransomware attack brings business to a close throughout Europe, in an
infection reminiscent of the WannaCry attack.

9689 1 by in Blogs

Ransomware Alert! Bad Rabbit

Oct 24, 2017 — Ransomware is showing up more frequently. Something we never want to have to deal with. If you want to make sure you are protected when using Palo Alto Network devices, then click to steer clear...

7208 3 by in Blogs

Smoking Out the Rarog Cryptocurrency Mining Trojan

Apr 4, 2018

Unit 42 investigates Rarog, a relatively unknown coin mining Trojan sold on various underground forums. Check out this forum to learn more!

 

8160 4 by in Blogs

DarkHydrus Adds Google Drive Support to Its RogueRobin Trojan for C2 Communications!

Jan 21, 2019 — The APT-group DarkHydrus has been busy with a new variant of the RogueRobin Trojan. See what it's about and how to stay protected!

1872 2 by in Blogs

OilRig Uses Updated BONDUPDATER to Target Middle Eastern Government

Sep 13, 2018 — The OilRig group has been active since at least mid-2016 and continues their attack campaigns throughout the Middle East, targeting both governmental agencies and businesses on an almost routine...

8599 1 by in Blogs

Ransomware: Upping the Ante

Sep 26, 2017 — Attackers have traditionally profited by stealing identities or credit card numbers, then selling them on underground markets. Now cyber attackers are on the hunt for new ways to...

7305 1 by in Blogs

Petya cyber attack - what's it all about?

Jun 28, 2017

Petrwrap/Petya ransomware. A major ransomware attack brings business to a close throughout Europe, in an
infection reminiscent of the WannaCry attack.

9689 1 by in Blogs

Palo Alto Networks protects against WanaCrypt0r and other ransomware attacks

May 16, 2017 — Want to know more about the latest WanaCrypt0r ransomware and ways that Palo Alto Networks can help you defend your network from these attacks? Please click to read more.

11635 2 8 by in Blogs

Coinhive.com – Malware or not?

Nov 10, 2017 — With the sheer amount of malware in the wild, it is hard to know what is real malware and what is not. Read about Coinhive.com and see why it may -- or may not -- be considered malware.

16022 1 3 by in Blogs

Unit 42 Uses AutoFocus to Identify Malware Faster

Apr 15, 2015 — Every IT professional has to deal with Malware attacks on a day to day basis. They are very disruptive, a nuisance, and can cause damage as well as loss of data.So, when there is something new...

7438 by in Blogs

Threat Prevention Services Videos