article thumbnail

Palo Alto targets zero-day threats with new firewall software

Network World

Palo Alto Networks has released next-generation firewall (NGFW) software that includes some 50 new features aimed at helping enterprise organizations battle zero-day threats and advanced malware attacks. The new features are built into the latest version of Palo Alto's firewall operating system – PAN 11.0

Firewall 136
article thumbnail

Government Agencies Discover New Chinese Malware Strain

SecureWorld News

CISA reports on Chinese malware strain. And it's a malware strain used specifically by the Chinese government. A recent CISA Malware Analysis Report (with contributions from the FBI and DoD), outlines this new malware variant. How should you defend yourself or your organization about this new malware variant?

Malware 53
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

‘Extremely bad’ vulnerability found in widely used logging system

The Verge

If exploited, the vulnerability allows remote code execution on vulnerable servers, giving an attacker the ability to import malware that would completely compromise machines. The vulnerability is found in log4j, an open-source logging library used by apps and services across the internet.

System 142
article thumbnail

Enhance Your Security Posture: Doing Four Things Can Reduce Unauthorized Penetrations by 85%

CTOvision

Malware Defenses. href="[link] Control 5: Malware Defenses. Secure Configurations for Network Devices such as Firewalls, Routers, and Switches. href="[link] Control 10: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches. Maintenance, Monitoring, and Analysis of Audit Logs.

Security 278
article thumbnail

Visa Security Alert: 12 Steps to Keep Card Skimmers Off Your Website

SecureWorld News

While the use of an XOR cipher is not new, this is the first time Visa has observed its use in JavaScript skimming malware. The developer of this malware kit uses the same cipher function in the loader and the skimmer.". Regularly scan and test eCommerce sites for vulnerabilities or malware.

Malware 57
article thumbnail

What to look for in endpoint detection and response tools and services

Network World

What you need to know Organizations are quickly learning that keeping the bad guys out of an enterprise environment isn’t as simple as deploying firewalls and antivirus. This means real-time monitoring, detection and advanced threat analysis coupled with response technology.

article thumbnail

2015 Cyberthreat Defense Report Reveals Cyberattacks Rising and Confidence Sinking

CTOvision

Phishing, malware, and zero-days top of mind. Of 10 designated categories of cyberthreats, phishing/spear-phishing, malware, and zero-day attacks are perceived as posing the greatest risk to responding organizations. Denial of service attacks, watering hole attacks, and drive-by downloads are of least concern.

Report 150