{"id":6334,"date":"2014-08-08T17:00:11","date_gmt":"2014-08-09T00:00:11","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=6334"},"modified":"2021-03-22T08:35:15","modified_gmt":"2021-03-22T15:35:15","slug":"palo-alto-networks-news-week-august-8","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2014\/08\/palo-alto-networks-news-week-august-8\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 August 8"},"content":{"rendered":"<p>Here\u2019s a roundup of this week\u2019s top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/news-of-the-week\/\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks news<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>From a well-attended session on our advanced endpoint protection to the buzz at the booth for Unit 42, there was plenty to take in at this year\u2019s Black Hat USA. <a href=\"http:\/\/bit.ly\/1y9ByKP\" target=\"_blank\" rel=\"noopener\">Here\u2019s a look back<\/a>.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:54.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-6337 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/black-hat1.png\" alt=\"black hat\" width=\"500\" height=\"273\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/black-hat1.png 488w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/black-hat1-230x125.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/black-hat1-73x40.png 73w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p>Ryan Olson, Unit 42 Intelligence Director, was on the show floor at Black Hat <a href=\"http:\/\/bit.ly\/1y7fb8E\" target=\"_blank\" rel=\"noopener\">to talk about<\/a> Unit 42, the team\u2019s 419 Evolution report, and how our threat intelligence process works.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:55.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-6338 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/ryan.png\" alt=\"ryan\" width=\"500\" height=\"279\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/ryan.png 485w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/ryan-230x128.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/ryan-71x40.png 71w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>In this <a href=\"http:\/\/bit.ly\/X1YBfE\" target=\"_blank\" rel=\"noopener\">Customer Spotlight<\/a>, find out how Melbourne and Olympics Parks, one of the largest and most diverse multi-purpose sporting, entertainment, conference, and community precincts in Australia, stays secure with Palo Alto Networks.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"341\"><span class=\"ar-custom\" style=\"padding-bottom:21.41%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-6307 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/parks-logo.png\" alt=\"parks logo\" width=\"341\" height=\"73\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/parks-logo.png 341w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/parks-logo-230x49.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/parks-logo-186x40.png 186w\" sizes=\"auto, (max-width: 341px) 100vw, 341px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<p>Unit 42\u2019s recently released report is on the evolution of \u201cSilver Spaniel\u201d 419 scammers.\u00a0 Of particular note is how these actors use a Remote Administration Tool (RAT) named NetWire. To better understand this RAT, our team reverse engineered the communication protocol that NetWire uses and we have released a tool that decrypts NetWire traffic and outputs any commands issued by the attacker. <a href=\"http:\/\/bit.ly\/1osKPMy\" target=\"_blank\" rel=\"noopener\">Specifics detailed here<\/a>, and be sure to <a href=\"http:\/\/connect.paloaltonetworks.com\/adversary-report\" target=\"_blank\" rel=\"noopener\">download the report, 419 Evolution<\/a>.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:40.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-6286 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/pic-3-500x201.png\" alt=\"pic 3\" width=\"500\" height=\"201\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/pic-3-500x201.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/pic-3-230x92.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/pic-3-510x205.png 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/pic-3-99x40.png 99w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/pic-3.png 601w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p style=\"text-align: center;\"><em>Source:\u00a0<a href=\"https:\/\/privacycanada.net\" rel=\"nofollow,noopener\" >Privacy Canada<\/a><\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Recent events with Backoff Point of Sale malware &amp; a new variant of Citadel continue to highlight the abuse of remote access applications in the enterprise. <a href=\"http:\/\/bit.ly\/UXgKsN\" target=\"_blank\" rel=\"noopener\">Check out more information from Unit 42 researchers<\/a>.<\/p>\n<p>Did you know that Palo Alto Networks provides a new breed of intelligence to detect and prevent threats? <a href=\"http:\/\/bit.ly\/1o6GArm\" target=\"_blank\" rel=\"noopener\">Find out how<\/a>.<\/p>\n<p>We're excited to announce <a href=\"http:\/\/bit.ly\/1v74A1r\" target=\"_blank\" rel=\"noopener\">NextWave partner program enhancements<\/a> that will encourage our partners to go broader and deeper with Palo Alto Networks enterprise security platform technology.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"483\"><span class=\"ar-custom\" style=\"padding-bottom:50.93%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-4920 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/NextWave-logo-final.jpeg\" alt=\"NextWave logo-final\" width=\"483\" height=\"246\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/NextWave-logo-final.jpeg 483w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/NextWave-logo-final-230x117.jpeg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/NextWave-logo-final-78x40.jpeg 78w\" sizes=\"auto, (max-width: 483px) 100vw, 483px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/bit.ly\/1pgQ033\" target=\"_blank\" rel=\"noopener\">Watch<\/a> Brian Tokuyoshi, senior solutions analyst and expert in mobility and wireless network security, map out how to safely enable mobile devices for business use \u2014 and how you can get started with Palo Alto Networks GlobalProtect.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"475\"><span class=\"ar-custom\" style=\"padding-bottom:55.79%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-6330 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/brian-lightboard.png\" alt=\"brian lightboard\" width=\"475\" height=\"265\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/brian-lightboard.png 475w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/brian-lightboard-230x128.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/brian-lightboard-71x40.png 71w\" sizes=\"auto, (max-width: 475px) 100vw, 475px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noopener\">upcoming events<\/a> around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjMyNw==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: August 13, 2014 from 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjMzOA==\" target=\"_blank\" rel=\"noopener\">Take the Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>When: August 13, 2014 from 7:30 AM - 1:30 PM EST<\/li>\n<li>Where: Richmond, VA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjMxNw==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks Next-Generation Security - Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>When: August 14, 2014 from 10:00 AM - 3:00 PM EST<\/li>\n<li>Where: Wayne, PA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjMzNg==\" target=\"_blank\" rel=\"noopener\">Tech on Tap Event<\/a><\/p>\n<ul>\n<li>When: August 14, 2014 from 5:00 PM - 7:00 PM EST<\/li>\n<li>Where: Ashland, VA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjM0MA==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: August 20, 2014 from 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Here\u2019s a roundup of this week\u2019s top Palo Alto Networks news. &nbsp; &nbsp; From a well-attended session on our advanced endpoint protection to the buzz at the booth for Unit 42, there &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[295,155,598,133,604,131,76,203,115,108],"tags":[581,166,100,583,355,605],"coauthors":[709],"class_list":["post-6334","post","type-post","status-publish","format-standard","hentry","category-customer-spotlight","category-cybersecurity-2","category-endpoint-2","category-events","category-lightboard","category-malware-2","category-mobility","category-news-of-the-week","category-reports","category-threat-prevention-2","tag-419-evolution","tag-black-hat","tag-globalprotect","tag-netwire","tag-nextwave","tag-silver-spaniel"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6334","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=6334"}],"version-history":[{"count":4,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6334\/revisions"}],"predecessor-version":[{"id":98421,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6334\/revisions\/98421"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=6334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=6334"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=6334"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=6334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}