Follow-On to VBA-Initiated Infostealer Campaign: Exploring Related Malware and Actors

Follow-On to VBA-Initiated Infostealer Campaign: Exploring Related Malware and Actors

In late October, we began examination of a VBA-initiated Infostealer campaign. This blog post follows up on additional information we gathered on related malware and associated actors. Pivot On Initial Predator Pain Sample C2 In our previous post, we identified two Command and Control (C2) fully qualified domain names (FQDNs) for the initial Predator Pain [...]

Palo Alto Networks 2015 Predictions: Financial Services & Payment Processing

Palo Alto Networks 2015 Predictions: Financial Services & Payment Processing

As 2014 comes to a close, our subject matter experts check in on what they see as major topics and trends for the new year. (You can read all of our 2015 predictions content here.) Although financial institutions have long allocated resources to security, they have often been under siege, and have frequently been victims of [...]

Palo Alto Networks Named a Winner in GSN 2014 Homeland Security Awards

Palo Alto Networks Named a Winner in GSN 2014 Homeland Security Awards

We’re pleased to announce that Palo Alto Networks has won in the Government Security NewsHomeland Security Awards category for Best Network Security/Enterprise Firewall. We were also announced as a finalist in the Best Anti-Malware Solution category.   The GSN 2014 Homeland Security Awards Program was organized to honor distinguished vendors of IT Security and Physical [...]