Palo Alto Networks

Released: PoC for RCE flaw in Palo Alto Networks firewalls, gateways
Palo Alto Networks has silently patched a critical remote code execution vulnerability in its enterprise GlobalProtect SSL VPN, which runs on Palo Alto Networks’ …

NSS Labs test exposes weaknesses in NGFW products
Firewalls are the most widely deployed network security devices. Enterprises expect next generation firewalls (NGFWs) to prevent exploits and malware from infecting critical …

Are humans ready for AI to take control of digital security?
Just over a quarter (26%) of people in EMEA would prefer their cybersecurity to be managed by AI rather than a human, an online study conducted by Palo Alto Networks and …

Palo Alto Networks to acquire Twistlock and PureSec
Palo Alto Networks has entered into definitive agreements to acquire Twistlock, the leader in container security, and PureSec, a leader in serverless security, to extend its …

Enterprise VPN apps store authentication and session cookies insecurely
CVE-2019-1573, a flaw that makes VPN applications store the authentication and/or session cookies insecurely (i.e. unencrypted) in memory and/or log files, affects a yet to be …
Trustwave delivers managed support for key Palo Alto Networks offerings
Trustwave announced an expanded alliance with Palo Alto Networks for delivering managed security services to businesses and institutions worldwide. Trustwave now offers …
Palo Alto Networks to acquire Demisto
Palo Alto Networks, the global cybersecurity leader, announced that it has entered into a definitive agreement to acquire Demisto, a leading security company in the security …

New Mac malware steals cookies, cryptocurrency and computing power
A new piece of Mac malware is looking to steal both the targets’ computing power and their cryptocurrency stash, Palo Alto Networks researchers warn. About the …

Mining malware evades agent-based cloud security solutions
Cloud infrastructures are a growing target for threat actors looking to mine cryptocurrency, as their vast computational power allows them to multiply the mining …

Securing and managing the enterprise Internet of Things
A future where the Internet of Things spreads exponentially is almost certain. Seemingly everybody wants these devices: consumers for the helpful features and manufacturers …

Fake Flash updaters deliver cryptominers AND update Flash
Cryptominers have dethroned ransomware as the top malware threat and cybercriminals are coming up with new ways to keep the mining activity secret from the victims. One of …
Palo Alto Networks to acquire RedLock
Palo Alto Networks announced that it has entered into a definitive agreement to acquire RedLock. Under the terms of the agreement, Palo Alto Networks will pay approximately …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility