Palo Alto Networks
![tunnel light](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111058/tunnel-light-400x200.jpg)
Enterprise VPN apps store authentication and session cookies insecurely
CVE-2019-1573, a flaw that makes VPN applications store the authentication and/or session cookies insecurely (i.e. unencrypted) in memory and/or log files, affects a yet to be …
Trustwave delivers managed support for key Palo Alto Networks offerings
Trustwave announced an expanded alliance with Palo Alto Networks for delivering managed security services to businesses and institutions worldwide. Trustwave now offers …
Palo Alto Networks to acquire Demisto
Palo Alto Networks, the global cybersecurity leader, announced that it has entered into a definitive agreement to acquire Demisto, a leading security company in the security …
![Mac malware](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095317/mac-malware2-400x200.jpg)
New Mac malware steals cookies, cryptocurrency and computing power
A new piece of Mac malware is looking to steal both the targets’ computing power and their cryptocurrency stash, Palo Alto Networks researchers warn. About the …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111946/danger-400x200.jpg)
Mining malware evades agent-based cloud security solutions
Cloud infrastructures are a growing target for threat actors looking to mine cryptocurrency, as their vast computational power allows them to multiply the mining …
![colors](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100157/colors-400x200.jpg)
Securing and managing the enterprise Internet of Things
A future where the Internet of Things spreads exponentially is almost certain. Seemingly everybody wants these devices: consumers for the helpful features and manufacturers …
![Adobe Flash](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102905/adobe_flash_red-400x200.jpg)
Fake Flash updaters deliver cryptominers AND update Flash
Cryptominers have dethroned ransomware as the top malware threat and cybercriminals are coming up with new ways to keep the mining activity secret from the victims. One of …
Palo Alto Networks to acquire RedLock
Palo Alto Networks announced that it has entered into a definitive agreement to acquire RedLock. Under the terms of the agreement, Palo Alto Networks will pay approximately …
![Apache Struts](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104837/apache-struts-400x200.jpg)
PoC exploit for critical Apache Struts flaw found online
The Apache Software Foundation revealed last week the existence of a critical Apache Struts flaw (CVE-2018-11776) similar to the one exploited in the Equifax breach and urged …
CyberMDX raises $10 million Series A to expand medical cybersecurity to hospitals worldwide
CyberMDX announced the completion of a $10 million Series A financing. The round was led by Pitango Venture Capital, with participation from OurCrowd Qure. The number of …
![wallet](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102045/wallet-400x200.jpg)
Cryptocurrency-stealing malware relies on victims copy-pasting wallet info
An unconventional email spam campaign has been delivering unusual cryptocurrency-stealing malware to American and Japanese users. The emails are sporting “Re: …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102325/iot-400x200.jpg)
IoT malware targeting zero-day vulnerabilities
Once it became evident that IoT devices can be relatively easily enslaved in botnets and that even their limited power can be used for a variety of nefarious purposes, it was …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege