Home Search
Palo Alto Networks - search results
If you're not happy with the results, please do another search
Cyber Resilience is a Fork in the Road for Remote Workforce
Let’s face it, your network perimeter has changed for the foreseeable future and maybe forever. Remote workforce has become the new normal. What is...
Twitter Appoints Cybersecurity Veteran Rinki Sethi as CISO
After leaving the position of CISO vacant for months, Twitter has finally hired cybersecurity veteran Rinki Sethi to the role. Sethi will report to...
OT-ISAC Virtual Summit Brings Together the Best Minds in APAC for OT/ICS Security
It is not every day that you witness a star-studded lineup of CISOs and cybersecurity veterans come together on one platform with a common...
How IIFL Finance Ensures Cybersecurity for Remote Workers Servicing 2,377 branches
IIFL Finance is one of the leading players in the Indian financial services industry. The IIFL Group covers multiple markets, including wealth management, home...
Lucifer Malware Exploits Windows Vulnerabilities to Launch DDoS Attacks
Security experts from Palo Alto Networks discovered a new malware dubbed “Lucifer” targeting Windows systems with cryptojacking and distributed denial-of-service (DDoS) attacks. The researchers...
Mukashi Malware Exploits Zyxel NAS Device Vulnerabilities
Mirai malware that turns networked devices into remotely controlled bots has relaunched itself as Mukashi malware and has been actively exploiting Zyxel network-attached storage...
Hackers Launch Phishing Attack on World Health Organization
A hacker group targeted the World Health Organization (WHO) via a sophisticated phishing attack, which involved an email hosted on a phishing domain that...
83% of Healthcare Devices at Security Risk Due to COVID-19 Outbreak
Most healthcare organizations in the U.S. are running their medical devices on outdated software and operating systems, leaving them vulnerable to cyberattacks. According to...
Axis Security Raises US$17 Million Funding, Emerges from Stealth
Axis Security, a private application access provider recently emerged from stealth mode and raised a total of US$17 million in a funding round led...
New Rogue Cryptomining Techniques and Cases
It’s common knowledge that new cryptocurrency units come into existence through mining, a process of complex computation relying on CPU or GPU power. Unfortunately,...