//
archives

Palo Alto Networks

This category contains 591 posts

GDPR/NIS Countdown: How Ready Are Organisations to Get Their Cybersecurity in Order for the Next Decade?


This month marks the start of the 12-month countdown for organisations to be ready to comply with either – or in some cases both – the General Data Protection Regulations or the NIS Directive becoming law in Europe on the 25th and 10th of May 2018, respectively. Whether you have started working towards compliance in … Continue reading

Why Directors Feel Inadequate in Terms of Cybersecurity and What They Can Do About It


Executive Summary The National Association of Corporate Directors says that directors do not feel adequate in terms of mitigating cybersecurity issues. The problem is that we have led ourselves to believe that cybersecurity risk is somehow different from all the other risks that directors deal with daily. This is incorrect. The same risk strategies apply: … Continue reading

Threat Brief: WanaCrypt0r– What We Know


Situation Summary This Unit 42 blog provides an update on the threat situation surrounding the WanaCrypt0r ransomware attacks and how the attack propagates. Initial reports said that the WanaCrypt0r attack began as part of a spam/phishing campaign. Unit 42 and other researchers have concluded that these reports are not substantiated. While the initial attack vector … Continue reading

How Japan Is Aiming to Close the Cybersecurity Skills Gap Before Tokyo 2020


With only three years left before the Tokyo Summer Olympic Games in 2020, Japan is facing a shortfall of cybersecurity manpower. According to the Ministry of Economy, Trade and Industry (METI), the current shortfall of IT professionals to available opportunities is 132,060, which will further increase to 193,010 in 2020. About half of end-user companies believe … Continue reading

The Tech Challenge 2017: Challenging the Minds of Our Future Innovators


No screens, no candies, no toys, no instant gratification. Thousands of kids at The Tech Challenge 2017 wanted something more. They wanted to try their hand at being engineers. On April 29, a few colleagues from Palo Alto Networks and I volunteered to be judges at The Tech Museum of Innovation’s signature event, held in … Continue reading

Mole Ransomware: How One Malicious Spam Campaign Quickly Increased Complexity and Changed Tactics


On April 11th 2017, we saw a new malicious spam campaign using United States Postal Service (USPS)-themed emails with links that redirected to fake Microsoft Word online sites. These fake Word sites asked victims to install malware disguised as a Microsoft Office plugin. This campaign introduced a new ransomware called Mole, because names for any … Continue reading

Endpoint Protection for SCADA and ICS Environments? Traps Has Your Back


Information technology (IT) administrators have been quick to adopt new security solutions, but operational technology (OT) administrators are forced to proceed cautiously, in order to prevent compromising process performance or unwanted downtime. These concerns can result in deliberately leaving software unpatched, antivirus (AV) signatures outdated, technologies disjointed, or security solutions left out entirely. Even organizations … Continue reading

Pulling the Brake on the Magnitude EK Train


This blog goes into detail on recent work that Unit 42 has done to identify malicious sites associated with the Magnitude Exploit Kit (EK). It details the investigation process involved in identifying the algorithm used to generate domains used by the Magnitude EK. Defenders can use the provided data to identify possible domains that may … Continue reading

Ewind – Adware in Applications’ Clothing


Since mid-2016 we have observed multiple new samples of the Android Adware family “Ewind”. The actors behind this adware utilize a simple yet effective approach – they download a popular, legitimate Android application, decompile it, add their malicious routines, then repackage the Android application package (APK). They then distribute the trojanized application using their own, … Continue reading

Gearing Up for the Collegiate Cyber Defense Competition


It’s that time of the year when we get to root for our alma mater or favorite college competing in the Collegiate Cyber Defense Competition (CCDC). This year, Palo Alto Networks is supporting all 10 regional competitions, and the national competition, through the donation of our next-generation firewall, which CCDC teams will use to defend … Continue reading

Web Stats

  • 110,911 hits
@PhilipHungCao

@PhilipHungCao

@PhilipHungCao, GICSP, CISM, CCSP, CCSK, CASP, CIW-WSP, PCNSE7, ACSP, CCDA, DCSE, JNCIA, MCTS, MCSA, VCP5-DCV, VCP6-NV, ZCNT is a #TekF@rmer. He has 16 years' experience in ICT/Cybersecurity industry in various sectors & positions.

Personal Links

View Full Profile →

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 1,791 other followers

Twitter Updates

Archives

May 2017
M T W T F S S
« Apr    
1234567
891011121314
15161718192021
22232425262728
293031