Threat Prevention Services

Threat Prevention Services

Don’t let ‘em in! Block threats at the perimeter and protect your network, your assets, and your digital way of life. Palo Alto Networks protects your network against threats by providing multiple layers of prevention, confronting threats at each phase of the attack. We use global threat intelligence through the close integration of threat prevention security services, URL Filtering and WildFire to automatically discover unknown malware and deliver protections. What questions do you have about DNS Sinkhole, malware, file blocking, and more? Bring your questions to the perimeter of LIVEcommunity. Ask, share, learn, and protect.

Threat Prevention Services Discussions

Have questions? Join the Live Community to post your questions and get answers.
Author Topic Views Replies
yesterday

Remote Desktop Services Vulnerability (CVE-2019-1181, 1182, 1222, 1226)

Anyone know which Content Update (released or upcoming) might contain a mitigation for CVE-2019-1181, 1182, 1222, 1226? I understand there w...

posted in Threat & Vulnerability Discussions

609 3
a week ago

CVE-2019-9511 Multiple HTTP/2 implementations are vulnerable to a variety of denial-of-service (DoS)

Hi, Just wondering on expected release for signature for this Vulnerability?   CVE-2019-9511 till CVE-2019-9518 capable of DoS attack. Som...

posted in Threat & Vulnerability Discussions

112 0
yesterday

DNS Sinkhole - What constitutes investigation?

I have implemented DNS sinkholing and am curious what constitutes investigation. I am seeing some clients hitting the sinkhole but only for a short pe...

posted in Threat & Vulnerability Discussions

133 1
2 weeks ago

Wind River VxWorks

Is Palo Alto working on signatures/rules for the CVE's listed below ( ICS Advisory (ICSA-19-211-01) )? CVE‐2019‐12255CVE‐2019‐12256CVE‐2019‐12260...

posted in Threat & Vulnerability Discussions

203 0
2 weeks ago

URL Filtering - Dynamic Updates

Hello,We have URL filtering with the PAN-DB license. If a URL is determined to be malicious, (from other URL checking websites, but not from Palo Alot...

posted in Threat & Vulnerability Discussions

362 3

Threat Prevention Services Blogs

Hide 'N Seek Botnet Returns

Jun 14, 2019 — Hide 'N Seek adds to its menacing malware family.

719 3 by in Blogs

New IoT/Linux Malware Targets DVRs, Forms Botnet

Apr 6, 2017

Unit 42 identifies a variant of the IoT/Linux botnet "Tsunami". Read about how the "Amnesia" malware is delivered and distributed within the targeted network.

8960 2 by in Blogs

When Scripts Attacks, WildFire Protects

Jan 14, 2019 — Cyberattackers look for fast and easy ways to steal your data. Among many techniques in their playbooks, using scripts is a quickly growing trend. Why? It...

1699 4 by in Blogs

Petya cyber attack - what's it all about?

Jun 28, 2017

Petrwrap/Petya ransomware. A major ransomware attack brings business to a close throughout Europe, in an
infection reminiscent of the WannaCry attack.

9316 1 by in Blogs

Ransomware Alert! Bad Rabbit

Oct 24, 2017 — Ransomware is showing up more frequently. Something we never want to have to deal with. If you want to make sure you are protected when using Palo Alto Network devices, then click to steer clear...

6817 3 by in Blogs

Smoking Out the Rarog Cryptocurrency Mining Trojan

Apr 4, 2018

Unit 42 investigates Rarog, a relatively unknown coin mining Trojan sold on various underground forums. Check out this forum to learn more!

 

7737 4 by in Blogs

DarkHydrus Adds Google Drive Support to Its RogueRobin Trojan for C2 Communications!

Jan 21, 2019 — The APT-group DarkHydrus has been busy with a new variant of the RogueRobin Trojan. See what it's about and how to stay protected!

1403 2 by in Blogs

OilRig Uses Updated BONDUPDATER to Target Middle Eastern Government

Sep 13, 2018 — The OilRig group has been active since at least mid-2016 and continues their attack campaigns throughout the Middle East, targeting both governmental agencies and businesses on an almost routine...

8212 1 by in Blogs

Ransomware: Upping the Ante

Sep 26, 2017 — Attackers have traditionally profited by stealing identities or credit card numbers, then selling them on underground markets. Now cyber attackers are on the hunt for new ways to...

6939 1 by in Blogs

Petya cyber attack - what's it all about?

Jun 28, 2017

Petrwrap/Petya ransomware. A major ransomware attack brings business to a close throughout Europe, in an
infection reminiscent of the WannaCry attack.

9316 1 by in Blogs

Palo Alto Networks protects against WanaCrypt0r and other ransomware attacks

May 16, 2017 — Want to know more about the latest WanaCrypt0r ransomware and ways that Palo Alto Networks can help you defend your network from these attacks? Please click to read more.

10681 2 8 by in Blogs

Coinhive.com – Malware or not?

Nov 10, 2017 — With the sheer amount of malware in the wild, it is hard to know what is real malware and what is not. Read about Coinhive.com and see why it may -- or may not -- be considered malware.

15226 1 3 by in Blogs

Unit 42 Uses AutoFocus to Identify Malware Faster

Apr 15, 2015 — Every IT professional has to deal with Malware attacks on a day to day basis. They are very disruptive, a nuisance, and can cause damage as well as loss of data.So, when there is something new...

7100 by in Blogs

Threat Prevention Services Videos