{"id":11854,"date":"2016-01-16T04:00:54","date_gmt":"2016-01-16T12:00:54","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=11854"},"modified":"2016-01-15T15:27:36","modified_gmt":"2016-01-15T23:27:36","slug":"palo-alto-networks-news-of-the-week-january-16","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2016\/01\/palo-alto-networks-news-of-the-week-january-16\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 January 16"},"content":{"rendered":"<p>Here\u2019s all of the top Palo Alto Networks news from this past week.<\/p>\n<p>It\u2019s been a busy week for Unit 42, our threat intelligence team. Learn more about what they found after they <a href=\"http:\/\/bit.ly\/1P8NaFV\" rel=\"nofollow,noopener\"  target=\"_blank\">took a closer look<\/a> at recent holiday season-themed attacks. They also <a href=\"http:\/\/bit.ly\/1PnXEBw\" rel=\"nofollow,noopener\"  target=\"_blank\">found over 90,000 websites<\/a> compromised, leading them to believe Angler Exploit Kit is continuing to evade detection. And Josh Grunzweig continued the series \u201cHow to Use IDAPython to Make Your Life Easier\u201d with <a href=\"http:\/\/bit.ly\/1PsvCF3\" rel=\"nofollow,noopener\"  target=\"_blank\">part 5<\/a>. (Check out <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/12\/using-idapython-to-make-your-life-easier-part-1\/\" target=\"_blank\">part 1<\/a>, <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/12\/using-idapython-to-make-your-life-easier-part-2\/\" target=\"_blank\">part 2<\/a>, <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/01\/using-idapython-to-make-your-life-easier-part-3\/\" target=\"_blank\">part 3<\/a>, <a href=\"http:\/\/bit.ly\/1mCTWgT\" rel=\"nofollow,noopener\"  target=\"_blank\">part 4<\/a>).<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:13.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10819 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68-500x68.png\" alt=\"blog-title-unit42-500x68\" width=\"500\" height=\"68\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68-230x31.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68-240x33.png 240w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><!--more--><\/p>\n<p>Steve Winterfeld reviewed \"<a href=\"http:\/\/bit.ly\/1ZgHcrW\" rel=\"nofollow,noopener\"  target=\"_blank\">CRACK99: The Takedown of a $100 Million Chinese Software Pirate<\/a>\" for the Cybersecurity Canon.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/cybersec-canon-red-500x218.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:43.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-11567 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/cybersec-canon-red-500x218-500x218.png\" alt=\"cybersec-canon-red-500x218\" width=\"500\" height=\"218\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/cybersec-canon-red-500x218.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/cybersec-canon-red-500x218-230x100.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/cybersec-canon-red-500x218-92x40.png 92w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Matt Mellen and Damien Lim <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/01\/healthcare-providers-protect-patient-privacy-by-securing-the-endpoint\/\" target=\"_blank\">gave healthcare providers a tip<\/a> on why you should protect patient privacy by securing the endpoint.<\/p>\n<p>Former City of New York CIO <a href=\"http:\/\/bit.ly\/1PbUC2T\" rel=\"nofollow,noopener\"  target=\"_blank\">Yisroel Hecht shared advice<\/a> for weathering the cybersecurity product and services market downpour<\/p>\n<p>We shared <a href=\"http:\/\/bit.ly\/1OirXfm\" rel=\"nofollow,noopener\"  target=\"_blank\">step-by-step instructions<\/a> on how to use our API with AutoFocus and Postman to automate various components of our platform.<\/p>\n<p>This week's <a href=\"http:\/\/bit.ly\/1ZpEUXH\" rel=\"nofollow,noopener\"  target=\"_blank\">Channel Scoop<\/a> featured a new video: \u201cWhy Partner with Palo Alto Networks?\u201d<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1.jpg\"><div style=\"max-width:100%\" data-width=\"498\"><span class=\"ar-custom\" style=\"padding-bottom:54.02%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-10802 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1.jpg\" alt=\"PAN_ChannelScoop_Blog\" width=\"498\" height=\"269\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1.jpg 498w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1-230x124.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1-74x40.jpg 74w\" sizes=\"auto, (max-width: 498px) 100vw, 498px\" \/><\/span><\/div><\/a><\/p>\n<p>In case you weren\u2019t able to attend in person, <a href=\"http:\/\/bit.ly\/1Os3CS0\" rel=\"nofollow,noopener\"  target=\"_blank\">presentations from Fuel User Group\u2019s Spark User Summit Amsterdam, Boston &amp; Sydney<\/a> are now available for download.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/01\/spark-user-summit2.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:61.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-11856 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/01\/spark-user-summit2-500x309.png\" alt=\"spark user summit2\" width=\"500\" height=\"309\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/01\/spark-user-summit2.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/01\/spark-user-summit2-230x142.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/01\/spark-user-summit2-485x300.png 485w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/01\/spark-user-summit2-65x40.png 65w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:12.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-11218 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62-500x62.jpg\" alt=\"youre invited\" width=\"500\" height=\"62\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62.jpg 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62-230x29.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62-240x30.jpg 240w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Here are\u00a0<a href=\"http:\/\/events.paloaltonetworks.com\/\">upcoming events<\/a>\u00a0around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDcwNA==\">Industrial Control Systems Cybersecurity Workshop \u2013 OKC<\/a><\/p>\n<ul>\n<li>January 19, 2016 11:30 AM - 1:30 PM CST<\/li>\n<li>Oklahoma City, OK<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDcwMw==\">Industrial Control Systems Cybersecurity Workshop - Tulsa, OK<\/a><\/p>\n<ul>\n<li>January 20, 2016 11:30 AM - 1:30 PM CST<\/li>\n<li>Tulsa, OK<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDU3NA==\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>January 20, 2016 9:00 AM - 10:00 AM PST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDc4Mg==\">Siber Sald\u0131r\u0131lar ve Korunma Y\u00f6ntemleri Web Semine<\/a><\/p>\n<ul>\n<li>January 20, 2016 10:00 AM - 11:30 AM EET<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDY2Ng==\">Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>January 20, 2016 9:30 AM - 1:00 PM GMT<\/li>\n<li>London<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDYwOA==\">Virtualized Data Center Workshop with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>January 20, 2016 8:00 AM - 1:00 PM EST<\/li>\n<li>Columbia, MD<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDc0MQ==\">Take The Ultimate Next-Generation Firewall Test Drive \u2013 Dubai<\/a><\/p>\n<ul>\n<li>January 21, 2016 9:00 AM - 2:00 PM GMT+3:00<\/li>\n<li>Dubai<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDE1MA==\">1\u670822\u65e5(\u91d1)\u88fd\u54c1\u4f53\u611f\uff7e\uff90\uff85\uff70<\/a><\/p>\n<ul>\n<li>January 22, 2016 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>\u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here\u2019s all of the top Palo Alto Networks news from this past week. It\u2019s been a busy week for Unit 42, our threat intelligence team. Learn more about what they found after &hellip;<\/p>\n","protected":false},"author":156,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203],"tags":[251,1675],"coauthors":[1546],"class_list":["post-11854","post","type-post","status-publish","format-standard","hentry","category-events","category-news-of-the-week","tag-cybersecurity-canon","tag-idapython"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11854","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/156"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=11854"}],"version-history":[{"count":2,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11854\/revisions"}],"predecessor-version":[{"id":11857,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11854\/revisions\/11857"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=11854"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=11854"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=11854"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=11854"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}