Threat Prevention Services

Threat Prevention Services

Palo Alto Networks Threat Prevention Services leverage the visibility of our next-generation firewall to inspect all traffic, automatically preventing known threats, regardless of port, protocol or SSL encryption, confronting threats at each phase of the attack. This page provides resources about threat prevention security services to help keep your network secure. Ask your questions or provide insightful answers in the discussion forum specific to Threat Prevention.

Threat Prevention Services Discussions

Have questions? Join the Live Community to post your questions and get answers.
Author Topic Views Replies
Tuesday

Microsoft office/teams malicious traffic

We are seeing bunch of Microsoft office 365/teams related traffic categorized as vulnerable/virus. But we don't find anything malicious about it, alth...

posted in Threat & Vulnerability Discussions

164 1
2 weeks ago

Malicious traffic blocked by PAN : Virus/Win32.WGeneric.ajbecg(340897548)

Hi Team,These are the below sign identified in our network and want to know the reason for this trigger.Please provide the related application effecte...

posted in Threat & Vulnerability Discussions

495 7
2 weeks ago

Virus/Win32.WGeneric.ajqxax

Starting yesterday I have seen virus alerts on my firewall relating to the above virus. The file names in question are Teams.nuspec and Teams-1.3.00.1...

posted in Threat & Vulnerability Discussions

184 1
2 weeks ago

SSH protocol uses Weak key exchange algorithms in PA 500 for PAN OS 8.1.14

Hi Team ,  PA 500 with 8.1.14 (latest OS )  is having the Vulnerability SSH protocol uses Weak key exchange algorithms. I understand we...

posted in Threat & Vulnerability Discussions

328 4
2 weeks ago

How to stop MortiAgent Malware using the snort rule ?

Software Version9.0.5 Problem Description:  How to stop MortiAgent Malware using snort rule ? I want to stop the MoriAgent malware by a...

posted in Threat & Vulnerability Discussions

291 2

Threat Prevention Services Blogs

Hide N Seek Botnet Return

Jun 14, 2019 — Hide 'N Seek adds to its menacing malware family.

1883 3 by in Blogs

New IoT/Linux Malware Targets DVRs, Forms Botnet

Apr 6, 2017 — Unit 42 identifies a variant of the IoT/Linux botnet "Tsunami". Read about how the "Amnesia" malware is delivered and distributed within the targeted network.

10049 2 by in Blogs

When Scripts Attacks, WildFire Protects

Jan 14, 2019 — Cyberattackers look for fast and easy ways to steal your data. Among many techniques in their playbooks, using scripts is a quickly growing trend. Why? It requires minimum human intervention, automates...

5399 4 by in Blogs

Petya cyber attack - what's it all about?

Jun 28, 2017 — Petrwrap/Petya ransomware. A major ransomware attack brings business to a close throughout Europe, in an infection reminiscent of the WannaCry attack.

10192 1 by in Blogs

Ransomware Alert! Bad Rabbit

Oct 24, 2017 — Ransomware is showing up more frequently. Something we never want to have to deal with. If you want to make sure you are protected when using Palo Alto Network devices, then click to steer clear of the...

7812 3 by in Blogs

Smoking Out the Rarog Cryptocurrency Mining Trojan

Apr 4, 2018 — Unit 42 investigates Rarog, a relatively unknown coin mining Trojan sold on various underground forums. Check out this forum to learn more!

8824 4 by in Blogs

DarkHydrus Adds Google Drive Support to Its RogueRobin Trojan for C2 Communications!

Jan 21, 2019 — The APT-group DarkHydrus has been busy with a new variant of the RogueRobin Trojan. See what it's about and how to stay protected!

2465 2 by in Blogs

OilRig Uses Updated BONDUPDATER to Target Middle Eastern Government

Sep 13, 2018 — The OilRig group has been active since at least mid-2016 and continues their attack campaigns throughout the Middle East, targeting both governmental agencies and businesses on an almost routine basis....

9117 1 by in Blogs

No posts

Petya cyber attack - what's it all about?

Jun 28, 2017 — Petrwrap/Petya ransomware. A major ransomware attack brings business to a close throughout Europe, in an infection reminiscent of the WannaCry attack.

10192 1 by in Blogs

Palo Alto Networks protects against WanaCrypt0r and other ransomware attacks

May 16, 2017 — Want to know more about the latest WanaCrypt0r ransomware and ways that Palo Alto Networks can help you defend your network from these attacks? Please click to read more.

13555 2 8 by in Blogs

Coinhive.com – Malware or not?

Nov 10, 2017 — With the sheer amount of malware in the wild, it is hard to know what is real malware and what is not. Read about Coinhive.com and see why it may -- or may not -- be considered malware.

17351 1 3 by in Blogs

Unit 42 Uses AutoFocus to Identify Malware Faster

Apr 15, 2015 — Every IT professional has to deal with Malware attacks on a day to day basis. They are very disruptive, a nuisance, and can cause damage as well as loss of data.So, when there is something new that is...

7917 by in Blogs

Threat Prevention Services Videos