3 Use Cases for Panorama

3 Use Cases for Panorama

Did you know that you can find use cases for our products on our Technical Documentation portal? Our use case examples provide realistic scenarios and/or topologies that display a complete start to finish configuration. Besides showcasing the primary capabilities of the product, they highlight features that may be overlooked or that complement each other. In [...]

Google Chrome Exploitation – A Case Study

Google Chrome Exploitation – A Case Study

In this write-up, we will present several techniques used in exploiting a vulnerability in Google Chrome, and the various difficulties presented by its security mechanisms and considerations. We also offer some reflections regarding how some of the techniques used were made irrelevant by mitigations introduced since. The exploit was developed to exploit a bug in [...]

Unit 42 Explores Malware Attack Vectors in Key Industries

Unit 42 Explores Malware Attack Vectors in Key Industries

This week Unit 42 released its first Threat Landscape Review, looking at how malware trends affect key industries, from healthcare to high tech, around the world, and the particular persistence of the Kuluoz, or Asprox, campaign. This infographic represents some of the key data from the full report, which you can download from the Unit 42 page. Does anything shown [...]

The Cybersecurity Canon: Where Wizards Stay Up Late

The Cybersecurity Canon: Where Wizards Stay Up Late

The Cybersecurity Canon is official, and you can now see our website here. We modeled it after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have 20 books on the initial candidate list but we are soliciting help from the cybersecurity community to increase the number to be much more than [...]