Threat Prevention Services

Threat Prevention Services

Don’t let ‘em in! Block threats at the perimeter and protect your network, your assets, and your digital way of life. Palo Alto Networks protects your network against threats by providing multiple layers of prevention, confronting threats at each phase of the attack. We use global threat intelligence through the close integration of threat prevention security services, URL Filtering and WildFire to automatically discover unknown malware and deliver protections. What questions do you have about DNS Sinkhole, malware, file blocking, and more? Bring your questions to the perimeter of LIVEcommunity. Ask, share, learn, and protect.

Threat Prevention Services Discussions

Have questions? Join the Live Community to post your questions and get answers.
Author Topic Views Replies
Friday

HIP Report information

Hi, Is possible to extract the parameters showed after click the "magnifiying glass" button in Monitor --> HIP Match Specially the parame...

posted in Threat & Vulnerability Discussions

139 1
2 weeks ago

Threats on port 80 for globalprotect external interface?

We have been getting more and more threat alerts for our outside interface, that hosts our GlobalProtect portal/gateway, and in every alert its becaus...

posted in Threat & Vulnerability Discussions

387 6
2 weeks ago

Top 20 Outbound IP Report

We have a new security director and I have been tasked with created a few reports about IP traffic. The request for for the following:-Top 20 out...

posted in Threat & Vulnerability Discussions

189 1
4 weeks ago

Remote Code Vulnerability - CVE-2019-1367 - Expected Signature

Hello, Just wanted to inquire if there are any signatures out for this vulnerability or if not when we could expect it. Thanks....

posted in Threat & Vulnerability Discussions

2294 6
09-06-2019

SMB: User password brute force

We have been seeing SMB: User Password Brute Force Attempt threats coming into our logs.  We are not seeing a UN accompanied with the the traffic...

posted in Threat & Vulnerability Discussions

368 0

Threat Prevention Services Blogs

Hide N Seek Botnet Return

Jun 14, 2019 — Hide 'N Seek adds to its menacing malware family.

973 3 by in Blogs

New IoT/Linux Malware Targets DVRs, Forms Botnet

Apr 6, 2017

Unit 42 identifies a variant of the IoT/Linux botnet "Tsunami". Read about how the "Amnesia" malware is delivered and distributed within the targeted network.

9180 2 by in Blogs

When Scripts Attacks, WildFire Protects

Jan 14, 2019 — Cyberattackers look for fast and easy ways to steal your data. Among many techniques in their playbooks, using scripts is a quickly growing trend. Why? It...

2266 4 by in Blogs

Petya cyber attack - what's it all about?

Jun 28, 2017

Petrwrap/Petya ransomware. A major ransomware attack brings business to a close throughout Europe, in an
infection reminiscent of the WannaCry attack.

9514 1 by in Blogs

Ransomware Alert! Bad Rabbit

Oct 24, 2017 — Ransomware is showing up more frequently. Something we never want to have to deal with. If you want to make sure you are protected when using Palo Alto Network devices, then click to steer clear...

7025 3 by in Blogs

Smoking Out the Rarog Cryptocurrency Mining Trojan

Apr 4, 2018

Unit 42 investigates Rarog, a relatively unknown coin mining Trojan sold on various underground forums. Check out this forum to learn more!

 

7976 4 by in Blogs

DarkHydrus Adds Google Drive Support to Its RogueRobin Trojan for C2 Communications!

Jan 21, 2019 — The APT-group DarkHydrus has been busy with a new variant of the RogueRobin Trojan. See what it's about and how to stay protected!

1691 2 by in Blogs

OilRig Uses Updated BONDUPDATER to Target Middle Eastern Government

Sep 13, 2018 — The OilRig group has been active since at least mid-2016 and continues their attack campaigns throughout the Middle East, targeting both governmental agencies and businesses on an almost routine...

8442 1 by in Blogs

Ransomware: Upping the Ante

Sep 26, 2017 — Attackers have traditionally profited by stealing identities or credit card numbers, then selling them on underground markets. Now cyber attackers are on the hunt for new ways to...

7128 1 by in Blogs

Petya cyber attack - what's it all about?

Jun 28, 2017

Petrwrap/Petya ransomware. A major ransomware attack brings business to a close throughout Europe, in an
infection reminiscent of the WannaCry attack.

9514 1 by in Blogs

Palo Alto Networks protects against WanaCrypt0r and other ransomware attacks

May 16, 2017 — Want to know more about the latest WanaCrypt0r ransomware and ways that Palo Alto Networks can help you defend your network from these attacks? Please click to read more.

11219 2 8 by in Blogs

Coinhive.com – Malware or not?

Nov 10, 2017 — With the sheer amount of malware in the wild, it is hard to know what is real malware and what is not. Read about Coinhive.com and see why it may -- or may not -- be considered malware.

15686 1 3 by in Blogs

Unit 42 Uses AutoFocus to Identify Malware Faster

Apr 15, 2015 — Every IT professional has to deal with Malware attacks on a day to day basis. They are very disruptive, a nuisance, and can cause damage as well as loss of data.So, when there is something new...

7281 by in Blogs

Threat Prevention Services Videos