Threat Prevention Services

Threat Prevention Services

Palo Alto Networks Threat Prevention Services leverage the visibility of our next-generation firewall to inspect all traffic, automatically preventing known threats, regardless of port, protocol or SSL encryption, confronting threats at each phase of the attack. This page provides resources about threat prevention security services to help keep your network secure. Ask your questions or provide insightful answers in the discussion forum specific to Threat Prevention.

Threat Prevention Services Discussions

Have questions? Join the Live Community to post your questions and get answers.
Author Topic Views Replies
Wednesday

incorrect destination zone in threat logs

Hi, if the firewall is configured with zone protection profiles and the setting "set system setting additional-threat-log on" is configured, i ha...

posted in Threat & Vulnerability Discussions

83 1
Thursday

Spyware with DNS Protection

Hi All,Our Firewall drop DNS traffic of C&C ( us.jaxonsorensen.club, news.sqllitlerver.info & log.osloger.biz) with source IP Address of ...

posted in Threat & Vulnerability Discussions

143 3
a week ago

SSL Self Signed Certificate Vulnerability

Does anybody know how to mitigate this vulnerability? This is being detected on our PA-3020 series firewalls running PAN OS 8.1.13....

posted in Threat & Vulnerability Discussions

186 2
Tuesday

DNS issues after implementing GeoBlock policy.

Hey guys, wanted to see if I can can get any input on this here - had to Geoblock one of  the countries for inbound/outbound traffic completely. ...

posted in Threat & Vulnerability Discussions

175 2
3 weeks ago

Microsoft office/teams malicious traffic

We are seeing bunch of Microsoft office 365/teams related traffic categorized as vulnerable/virus. But we don't find anything malicious about it, alth...

posted in Threat & Vulnerability Discussions

279 1

Threat Prevention Services Blogs

Hide N Seek Botnet Return

Jun 14, 2019 — Hide 'N Seek adds to its menacing malware family.

1928 3 by in Blogs

New IoT/Linux Malware Targets DVRs, Forms Botnet

Apr 6, 2017 — Unit 42 identifies a variant of the IoT/Linux botnet "Tsunami". Read about how the "Amnesia" malware is delivered and distributed within the targeted network.

10116 2 by in Blogs

When Scripts Attacks, WildFire Protects

Jan 14, 2019 — Cyberattackers look for fast and easy ways to steal your data. Among many techniques in their playbooks, using scripts is a quickly growing trend. Why? It requires minimum human intervention, automates...

5734 4 by in Blogs

Petya cyber attack - what's it all about?

Jun 28, 2017 — Petrwrap/Petya ransomware. A major ransomware attack brings business to a close throughout Europe, in an infection reminiscent of the WannaCry attack.

10227 1 by in Blogs

Ransomware Alert! Bad Rabbit

Oct 24, 2017 — Ransomware is showing up more frequently. Something we never want to have to deal with. If you want to make sure you are protected when using Palo Alto Network devices, then click to steer clear of the...

7857 3 by in Blogs

Smoking Out the Rarog Cryptocurrency Mining Trojan

Apr 4, 2018 — Unit 42 investigates Rarog, a relatively unknown coin mining Trojan sold on various underground forums. Check out this forum to learn more!

8865 4 by in Blogs

DarkHydrus Adds Google Drive Support to Its RogueRobin Trojan for C2 Communications!

Jan 21, 2019 — The APT-group DarkHydrus has been busy with a new variant of the RogueRobin Trojan. See what it's about and how to stay protected!

2501 2 by in Blogs

OilRig Uses Updated BONDUPDATER to Target Middle Eastern Government

Sep 13, 2018 — The OilRig group has been active since at least mid-2016 and continues their attack campaigns throughout the Middle East, targeting both governmental agencies and businesses on an almost routine basis....

9155 1 by in Blogs

No posts

Petya cyber attack - what's it all about?

Jun 28, 2017 — Petrwrap/Petya ransomware. A major ransomware attack brings business to a close throughout Europe, in an infection reminiscent of the WannaCry attack.

10227 1 by in Blogs

Palo Alto Networks protects against WanaCrypt0r and other ransomware attacks

May 16, 2017 — Want to know more about the latest WanaCrypt0r ransomware and ways that Palo Alto Networks can help you defend your network from these attacks? Please click to read more.

13748 2 8 by in Blogs

Coinhive.com – Malware or not?

Nov 10, 2017 — With the sheer amount of malware in the wild, it is hard to know what is real malware and what is not. Read about Coinhive.com and see why it may -- or may not -- be considered malware.

17492 1 3 by in Blogs

Unit 42 Uses AutoFocus to Identify Malware Faster

Apr 15, 2015 — Every IT professional has to deal with Malware attacks on a day to day basis. They are very disruptive, a nuisance, and can cause damage as well as loss of data.So, when there is something new that is...

7951 by in Blogs

Threat Prevention Services Videos