Home Search

Palo Alto Networks - search results

If you're not happy with the results, please do another search

Cyber Resilience is a Fork in the Road for Remote Workforce

0
Let’s face it, your network perimeter has changed for the foreseeable future and maybe forever.  Remote workforce has become the new normal. What is...

Twitter Appoints Cybersecurity Veteran Rinki Sethi as CISO

0
After leaving the position of CISO vacant for months, Twitter has finally hired cybersecurity veteran Rinki Sethi to the role. Sethi will report to...
OT-ISAC Virtual Summit 2020

OT-ISAC Virtual Summit Brings Together the Best Minds in APAC for OT/ICS Security

0
It is not every day that you witness a star-studded lineup of CISOs and cybersecurity veterans come together on one platform with a common...
Cybersecurity for remote workers

How IIFL Finance Ensures Cybersecurity for Remote Workers Servicing 2,377 branches

0
IIFL Finance is one of the leading players in the Indian financial services industry. The IIFL Group covers multiple markets, including wealth management, home...
WhisperGate malware campaign, Flagpro malware, MosaicLoader Malware, drinik

Lucifer Malware Exploits Windows Vulnerabilities to Launch DDoS Attacks

0
Security experts from Palo Alto Networks discovered a new malware dubbed “Lucifer” targeting Windows systems with cryptojacking and distributed denial-of-service (DDoS) attacks. The researchers...
Armor Piercer

Mukashi Malware Exploits Zyxel NAS Device Vulnerabilities

0
Mirai malware that turns networked devices into remotely controlled bots has relaunched itself as Mukashi malware and has been actively exploiting Zyxel network-attached storage...
Phishing, phishing attacks

Hackers Launch Phishing Attack on World Health Organization

0
A hacker group targeted the World Health Organization (WHO) via a sophisticated phishing attack, which involved an email hosted on a phishing domain that...
Healthcare Data Breaches, Premier Diagnostics data exposed

83% of Healthcare Devices at Security Risk Due to COVID-19 Outbreak

0
Most healthcare organizations in the U.S. are running their medical devices on outdated software and operating systems, leaving them vulnerable to cyberattacks. According to...
Axis Security Raises US$17 Million Funding, Emerges from Stealth

Axis Security Raises US$17 Million Funding, Emerges from Stealth

0
Axis Security, a private application access provider recently emerged from stealth mode and raised a total of US$17 million in a funding round led...
Cryptocurrency

New Rogue Cryptomining Techniques and Cases

0
It’s common knowledge that new cryptocurrency units come into existence through mining, a process of complex computation relying on CPU or GPU power. Unfortunately,...

MOST POPULAR

RECENT POSTS