{"id":11103,"date":"2015-11-21T04:00:11","date_gmt":"2015-11-21T12:00:11","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=11103"},"modified":"2015-12-08T17:11:41","modified_gmt":"2015-12-09T01:11:41","slug":"palo-alto-networks-news-of-the-week-november-21","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/11\/palo-alto-networks-news-of-the-week-november-21\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 November 21"},"content":{"rendered":"<p>Read on for all of our top news from this past week.<\/p>\n<p>We kicked off our 2016 Cybersecurity Predictions series:<\/p>\n<ul>\n<li><a href=\"http:\/\/bit.ly\/1PGx3mX\" rel=\"nofollow,noopener\" >Prediction 1<\/a>: Joerg Sieber predicts how changes in marketing trends could impact web-based attacks in 2016.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1QKVwbn\" rel=\"nofollow,noopener\" >Prediction 2<\/a>: Brian Tokuyoshi predicts that the \u201cwhat\u201d will matter more than the \u201cwho\u201d in mobile security.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:35%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10981 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner-500x175.png\" alt=\"Top-10-Predictions-Banner\" width=\"500\" height=\"175\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner-230x81.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner-114x40.png 114w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><!--more--><\/p>\n<p>Want to present at Ignite 2016? <a href=\"http:\/\/bit.ly\/1I4UHTR\" rel=\"nofollow,noopener\"  target=\"_blank\">Call for Papers is now open<\/a>! <a href=\"http:\/\/bit.ly\/1QsVyEE\" rel=\"nofollow,noopener\" >Early bird registration is also open<\/a>. Register before December 31 for $400 off your conference pass.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:24.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10919 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-500x124.png\" alt=\"Ignite 2016\" width=\"500\" height=\"124\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-500x124.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-230x57.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-510x126.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-162x40.png 162w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016.png 603w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Unit 42 <a href=\"http:\/\/bit.ly\/1SFDqpM\" rel=\"nofollow,noopener\" >found TDrop2<\/a> attacks that suggest Dark Seoul attackers return. The team also used Palo Alto Networks AutoFocus to <a href=\"http:\/\/bit.ly\/1l9NGvA\" rel=\"nofollow,noopener\" >identify several thousand functionally identical Upatre binaries<\/a> with unique hashes that exhibited unusual anti-analysis behaviors.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:13.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10819 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68-500x68.png\" alt=\"blog-title-unit42-500x68\" width=\"500\" height=\"68\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68-230x31.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68-240x33.png 240w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Has your network shared drive been encrypted by CryptoWall? <a href=\"http:\/\/bit.ly\/1RZPKkT\" rel=\"nofollow,noopener\" >Matt Mellen teaches you how to track down the infected PC<\/a>.<\/p>\n<p>Listen to Davis Hake\u2019s <a href=\"http:\/\/bit.ly\/210qjWl\" rel=\"nofollow,noopener\" >recent interview with Bloomberg Radio<\/a> from Bloomberg's The Year Ahead 2016 event.<\/p>\n<p>Palo Alto Networks attended Black Hat Europe 2015. <a href=\"http:\/\/bit.ly\/1HUz3GX\" rel=\"nofollow,noopener\" >Check out all of the action<\/a>.<\/p>\n<p>Let us do the information gathering for you on the latest partner news. <a href=\"http:\/\/bit.ly\/1LpfotJ\" rel=\"nofollow,noopener\" >Sit back and relax with this week\u2019s Channel Scoop<\/a>.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1.jpg\"><div style=\"max-width:100%\" data-width=\"498\"><span class=\"ar-custom\" style=\"padding-bottom:54.02%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-10802 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1.jpg\" alt=\"PAN_ChannelScoop_Blog\" width=\"498\" height=\"269\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1.jpg 498w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1-230x124.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1-74x40.jpg 74w\" sizes=\"auto, (max-width: 498px) 100vw, 498px\" \/><\/span><\/div><\/a><\/p>\n<p>Join Fuel User Group today and learn what\u2019s in store at <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/11\/the-best-technical-education-at-fuels-spark-user-summits\/\">upcoming Spark User Summits<\/a> in Boston, Sydney &amp; Amsterdam. Have questions about the Fuel User Group? <a href=\"http:\/\/bit.ly\/1X8CeN7\" rel=\"nofollow,noopener\" >Get them answered<\/a>.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/fuel.png\"><div style=\"max-width:100%\" data-width=\"429\"><span class=\"ar-custom\" style=\"padding-bottom:41.72%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-10615 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/fuel.png\" alt=\"fuel\" width=\"429\" height=\"179\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/fuel.png 429w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/fuel-230x96.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/fuel-96x40.png 96w\" sizes=\"auto, (max-width: 429px) 100vw, 429px\" \/><\/span><\/div><br \/>\n<\/a><\/p>\n<p>Don\u2019t forget to get your free copy of <a href=\"http:\/\/bit.ly\/1X8Zhr0\" rel=\"nofollow,noopener\" >Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers<\/a>, and listen to this on-demand webcast on <a href=\"http:\/\/bit.ly\/1Sqzn0r\" rel=\"nofollow,noopener\" >Reassessing the Cyber Threat Landscape<\/a>.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/navigating-digital-age-banner-500x1141.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:22.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10986 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/navigating-digital-age-banner-500x1141-500x114.png\" alt=\"navigating-digital-age-banner-500x114\" width=\"500\" height=\"114\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/navigating-digital-age-banner-500x1141.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/navigating-digital-age-banner-500x1141-230x52.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/navigating-digital-age-banner-500x1141-175x40.png 175w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/phpThumb_generated_thumbnailjpg.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:12.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10889 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/phpThumb_generated_thumbnailjpg-500x62.jpg\" alt=\"phpThumb_generated_thumbnailjpg\" width=\"500\" height=\"62\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/phpThumb_generated_thumbnailjpg-500x62.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/phpThumb_generated_thumbnailjpg-230x28.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/phpThumb_generated_thumbnailjpg-510x63.jpg 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/phpThumb_generated_thumbnailjpg-240x30.jpg 240w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/phpThumb_generated_thumbnailjpg.jpg 728w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Here are\u00a0<a href=\"http:\/\/events.paloaltonetworks.com\/\">upcoming events<\/a>\u00a0around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDUzNA==\">Ultimate Test Drive workshop<\/a><\/p>\n<ul>\n<li>When: November 23, 2015 9:30 AM - 1:00 PM GMT+11:00<\/li>\n<li>Where: Melbourne, VIC<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNDE0Mg==\">11\u670825\u65e5(\u6c34)\u88fd\u54c1\u4f53\u611f\uff7e\uff90\uff85\uff70(\u5927\u962a)<\/a><\/p>\n<ul>\n<li>When: November 25, 2015 1:30 PM \u2013 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5927\u962a\u5e02\u5317\u533a<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNDU2NQ==\">G\u00fcvenlikte Layer4'ten Layer7'ye Uzanan Macera<\/a><\/p>\n<ul>\n<li>When: November 25, 2015 10:00 AM - 11:00 AM EET<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNDI2NA==\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: November 25, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNDU0Mw==\">Ultimate Test Drive workshop Brisbane<\/a><\/p>\n<ul>\n<li>When: November 25, 2015 9:00 AM - 12:30 PM (GMT + 10:00)<\/li>\n<li>Where: Brisbane, QLD<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNDE0NA==\">11\u670827\u65e5(\u91d1)\u88fd\u54c1\u5b9f\u611f\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a><\/p>\n<ul>\n<li>When: November 27, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.brighttalk.com\/webcast\/13565\/179291?utm_campaign=FY16Q2%20NAM%20Threat%20Cryptowall%20Analyzed%20Report%20Nov15&amp;utm_medium=email&amp;utm_source=Eloqua\" rel=\"nofollow,noopener\" >Lucrative Ransomware Attacks: Analysis of the CryptoWall Version 3 Threat <\/a><\/p>\n<ul>\n<li>When: December 1, 2015 9:00 AM \u2013 10:00 AM PST<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDQ1MQ==\">Palo Alto Networks and VMware NSX Micro-Segmentation Workshop<\/a><\/p>\n<ul>\n<li>When: December 1, 2015 8:30 AM - 4:30 PM EST<\/li>\n<li>Where: Reston, VA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDI2NQ==\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: December 2, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDYxNQ==\">Threat Prevention Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>When: December 2, 2015 8:30 AM - 12:00 PM EST<\/li>\n<li>Where: New York, NY<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDQ1Mw==\">Palo Alto Networks and VMware NSX Micro-Segmentation Workshop<\/a><\/p>\n<ul>\n<li>When: December 3, 2015 8:30 AM - 4:30 PM EST<\/li>\n<li>Where: Fulton, MD<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDUzMw==\">Partner Sales Bootcamp<\/a><\/p>\n<ul>\n<li>When: December 3, 2015 2:00 PM - 5:00 PM EST<\/li>\n<li>Where: Indianapolis, IN<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDUxOA==\">Prevenga Ciber-amenazas con Palo Alto Networks y Connext<\/a><\/p>\n<ul>\n<li>When: December 3, 2015 9:00 AM - 12:00 PM CST<\/li>\n<li>Where: Guadalajara, JAL<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDU1NQ==\">Take the Ultimate Test Drive!<\/a><\/p>\n<ul>\n<li>When: December 3, 2015 1:00 PM - 4:00 PM CST<\/li>\n<li>Where: Maryland Heights, MO<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDUyNw==\">\u7d44\u7e54\u3092\u5b88\u308b\uff01\u6a19\u7684\u578b\u653b\u6483\u5bfe\u7b56\u30bb\u30df\u30ca\u30fc<\/a><\/p>\n<ul>\n<li>When: December 3, 2015 1:30 PM - 4:30 PM GMT+9:00<\/li>\n<li>Where: \u6e2f\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDE0MA==\">12\u67084\u65e5(\u91d1)\u88fd\u54c1\u4f53\u611f\uff7e\uff90\uff85\uff70<\/a><\/p>\n<ul>\n<li>When: December 4, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDUzNw==\">Die Zwei um Zw\u00f6lf: Die Zwei um zw\u00f6lf: Design Best Practices<\/a><\/p>\n<ul>\n<li>When: December 4, 2015 12:00 PM - 1:00 PM MEZ<\/li>\n<li>Where: Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDUzNw==\">Virtualized Data Center Workshop with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>When: December 4, 2015 8:30 AM - 12:30 PM EST<\/li>\n<li>Where: Portland, ME<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Read on for all of our top news from this past week. We kicked off our 2016 Cybersecurity Predictions series: Prediction 1: Joerg Sieber predicts how changes in marketing trends could impact &hellip;<\/p>\n","protected":false},"author":156,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,1066,203],"tags":[806,1582,1497,1584,1360],"coauthors":[1546],"class_list":["post-11103","post","type-post","status-publish","format-standard","hentry","category-events","category-fuel-user-group","category-news-of-the-week","tag-black-hat-europe","tag-dark-seoul","tag-navigating-the-digital-age","tag-tdrop2","tag-upatre"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11103","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/156"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=11103"}],"version-history":[{"count":6,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11103\/revisions"}],"predecessor-version":[{"id":11336,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11103\/revisions\/11336"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=11103"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=11103"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=11103"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=11103"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}