Threat Prevention Services

Threat Prevention Services

Palo Alto Networks Threat Prevention Services leverage the visibility of our next-generation firewall to inspect all traffic, automatically preventing known threats, regardless of port, protocol or SSL encryption, confronting threats at each phase of the attack. This page provides resources about threat prevention security services to help keep your network secure. Ask your questions or provide insightful answers in the discussion forum specific to Threat Prevention.

Threat Prevention Services Discussions

Need answers? Register or Sign-in to Engage, Share, and Learn.
Author Topic Views Replies
Sunday

Some Malicious Hash File Value not detected by Palo Alto Engine

Hi Team, We have received some list of Malicious HASH files and asked us to take the necessary action. But while checking we didn't see the below...

posted in Threat & Vulnerability Discussions

62 0
a week ago

VideoLAN - Virus/Win32.WGeneric.ashtnf

I am noticing that when either trying to download the latest VideoLAN player from their site, or updating via their application, the PAN is detecting ...

posted in Threat & Vulnerability Discussions

82 0
a week ago

RE: Egregor Ransomware attack on Palo Alto

Dear Team, PAN OS Version: 8.1.12PAN MODEL:  PA-3020If Palo Alto have a valid signature of this Egregor Ransomware attack ?  ...

posted in Threat & Vulnerability Discussions

134 1
2 weeks ago

Severity High and medium action are getting allow instead of block

Hi All,After upgrade to 9.1.5, i noticed the Severity level high and medium threat actions are allowed and some of them are getting sinkhole. Please l...

posted in Threat & Vulnerability Discussions

183 3
a month ago

Nat/Firewall Bypass Attack how palo alto protect from

A new research has demonstrated a technique that allow an attacker to bypass firewall protection and remotely access any TCP/UDP service on victim mac...

posted in Threat & Vulnerability Discussions

291 1

Threat Prevention Services Blogs

Hide N Seek Botnet Return

Jun 14, 2019 — Hide 'N Seek adds to its menacing malware family.

2687 3 by in Blogs

New IoT/Linux Malware Targets DVRs, Forms Botnet

Apr 6, 2017 — Unit 42 identifies a variant of the IoT/Linux botnet "Tsunami". Read about how the "Amnesia" malware is delivered and distributed within the targeted network.

10950 2 by in Blogs

When Scripts Attacks, WildFire Protects

Jan 14, 2019 — Cyberattackers look for fast and easy ways to steal your data. Among many techniques in their playbooks, using scripts is a quickly growing trend. Why? It requires minimum human intervention, automates...

9021 4 by in Blogs

Petya cyber attack - what's it all about?

Jun 28, 2017 — Petrwrap/Petya ransomware. A major ransomware attack brings business to a close throughout Europe, in an infection reminiscent of the WannaCry attack.

10763 1 by in Blogs

Ransomware Alert! Bad Rabbit

Oct 24, 2017 — Ransomware is showing up more frequently. Something we never want to have to deal with. If you want to make sure you are protected when using Palo Alto Network devices, then click to steer clear of the...

8564 3 by in Blogs

Smoking Out the Rarog Cryptocurrency Mining Trojan

Apr 4, 2018 — Unit 42 investigates Rarog, a relatively unknown coin mining Trojan sold on various underground forums. Check out this forum to learn more!

9492 4 by in Blogs

DarkHydrus Adds Google Drive Support to Its RogueRobin Trojan for C2 Communications!

Jan 21, 2019 — The APT-group DarkHydrus has been busy with a new variant of the RogueRobin Trojan. See what it's about and how to stay protected!

3101 2 by in Blogs

OilRig Uses Updated BONDUPDATER to Target Middle Eastern Government

Sep 13, 2018 — The OilRig group continues their attack campaigns throughout the Middle East. Check out this blog to read more about it and find out how Palo Alto Networks protects you!

9701 1 by in Blogs

No posts

Petya cyber attack - what's it all about?

Jun 28, 2017 — Petrwrap/Petya ransomware. A major ransomware attack brings business to a close throughout Europe, in an infection reminiscent of the WannaCry attack.

10763 1 by in Blogs

Protection Against WanaCrypt0r and Other Ransomware

May 16, 2017 — Want to know more about the latest WanaCrypt0r ransomware and ways that Palo Alto Networks can help you defend your network from these attacks? Please click to read more.

15849 2 8 by in Blogs

Coinhive.com – Malware or not?

Nov 10, 2017 — With the sheer amount of malware in the wild, it is hard to know what is real malware and what is not. Read about Coinhive.com and see why it may -- or may not -- be considered malware.

19276 1 3 by in Blogs

Unit 42 Uses AutoFocus to Identify Malware Faster

Apr 15, 2015 — Every IT professional has to deal with Malware attacks on a day to day basis. They are very disruptive, a nuisance, and can cause damage as well as loss of data.So, when there is something new that is...

8522 by in Blogs

Threat Prevention Services Videos