Palo Alto Networks News of the Week – December 5

Anna Lough


Here’s a brief recap on all the happenings at Palo Alto Networks from the past week.

We added to our 2016 Cybersecurity Predictions series:

  • Prediction 1: Joerg Sieber predicts how changes in marketing trends could impact web-based attacks in 2016.
  • Prediction 2: Brian Tokuyoshi predicts that the “what” will matter more than the “who” in mobile security.
  • Prediction 3: Matt Keil predicts public cloud security will move into the spotlight.
  • Prediction 4: Michael Moshiri predicts that growth in exploit-based attacks will require increased emphasis on prevention.
  • Prediction 5: Jonathan Lewis predicts the major trends that will gain prominence for service providers next year.
  • Prediction 6: Del Rodillas predicts the rise of mobility in the Industrial Internet of Things (IIoT), and how attackers will also start to use it to compromise the automation environment.

Top-10-Predictions-Banner

Ignite 2016 is only a few months away! Want to attend? Register before December 31 for $400 off your conference pass. Want to take the stage? The Call for Papers is open! Submit today.

Ignite 2016

In Part 3 of the Adversaries and Their Motivations blog series, Unit 42 explored the top-level actor motivations: Cyber Warfare, Cyber Terrorism, and Cyber Mischief.

Catch up on Part 1: The underlying concepts and the value proposition for exploring who is attacking a network and why; and Part 2: Cyber Espionage, Cyber Crime, and Cyber Hacktivism.

Unit 42 analyzed the Rootnik android trojan that abuses commercial rooting tool and steals private information.

Del Rodillas detailed the Security Lifecycle Report, a free assessment Palo Alto Networks offers as a way to provide users a detailed view of what applications and risks may be running in their industrial control systems (ICS) environment.

In Part 1 of Exploitation Demystified, Yiftach Keshet laid the foundation of memory corruption exploitation, and presented the basic exploitation framework. In Part 2, he covered the implementation of Overwrite and Redirect in the context of stack based buffer overflow vulnerabilities. Stay tuned for Part 3, where Yiftach will go over implementation of the exploitation framework on heap-based vulnerabilities.

exploit1-500x101

Kate Taylor shared a few tips and tricks on ways to combine and use features on our platform to help our customers better secure their organizations.

Brian Kelly explained why “Metasploit: The Penetration Tester’s Guide” is worthy of inclusion in the Cybersecurity Canon.

cybersec canon red

Looking for our latest channel-specific news? We rounded up all of the recent NextWave Partner news in this week’s Channel Scoop.

PAN_ChannelScoop_Blog

A reminder, it’s your last chance to register for this month’s Spark User Summits in Sydney, Amsterdam, and Boston.

spark_user_summit-500x309

 

 

phpThumb_generated_thumbnailjpg-500x62

Here are upcoming events around the world that you should know about:

Palo Alto Networks and Tanium VIP Reception

  • December 8, 2015 5:00 PM – 9:30 PM EST
  • Indianapolis, IN

TechSummit Japan 2015 Winter [Japanese]

  • December 8, 2015 1:30 PM – 5:30 PM GMT+9:00
  • 中央区

Palo Alto Networks Seminar

  • December 9, 2015 9:00 AM – 12:00 PM GMT+4:00
  • Abu Dhabi

Palo Alto Networks: Live Demo

  • December 9, 2015 9:00 AM – 10:00 AM PST
  • Online Event

Introduction to Palo Alto Networks Next Generation Firewalls

  • December 10, 2015 10:00 AM – 6:00 PM EST
  • Online Event

Palo Alto Networks Seminar

  • December 10, 2015 9:00 AM – 12:00 PM GMT+4:00
  • Dubai

Secure the Force: Star Wars y los ciber-ataques más usados en el 2015 [Spanish]

  • December 10, 2015 7:00 PM – 11:30 PM CST
  • Ciudad de México

Seguridad en el data center con Palo Alto Networks & VMware [Spanish]

  • December 10, 2015 8:00 AM – 12:00 PM CST
  • Ciudad de México

12月11日(金)製品実感トレーニング(大阪) [Japanese]

  • December 11, 2015 1:30 PM – 5:00 PM GMT+9:00
  • 大阪市北区

Why Layered Security Strategies Don’t Work – And What You Can Do About It

  • December 15, 2015 10:00 AM – 11:00 AM PT
  • Online Event

Palo Alto Networks & Tanium: Webinar Malicious Behavior Detection at Scale

  • December 16, 2015 10:00 AM – 11:00 AM PT
  • Online Event

12月16日(水)製品導入・運用支援トレーニング [Japanese]

  • December 16, 2015 1:30 PM – 5:00 PM GMT+9:00
  • 千代田区

Palo Alto Networks: Live Demo

  • December 16, 2015 9:00 AM – 10:00 AM PST
  • Online Event

Take the Ultimate Test Drive!

  • December 16, 2015 1:00 PM – 4:00 PM CST
  • Maryland Heights , MO

Threat Prevention Ultimate Test Drive

  • December 16, 2015 9:30 AM – 1:00 PM GMT
  • London

12月18日(金)製品実感トレーニング

  • December 18, 2015 1:30 PM – 5:00 PM GMT+9:00
  • 千代田区

 

Got something to say?

Get updates: Unit 42

Sign up to receive the latest news, cyber threat intelligence and research from Unit42


SUBSCRIBE TO RSS