{"id":12285,"date":"2016-02-20T04:00:25","date_gmt":"2016-02-20T12:00:25","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=12285"},"modified":"2016-02-19T17:23:21","modified_gmt":"2016-02-20T01:23:21","slug":"palo-alto-networks-news-of-the-week-february-20","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/02\/palo-alto-networks-news-of-the-week-february-20\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 February 20"},"content":{"rendered":"<p class=\"p1\">Here\u2019s all of the top Palo Alto Networks news from this past week.<\/p>\n<p class=\"p1\">Unit 42 <a href=\"https:\/\/urldefense.proofpoint.com\/v2\/url?u=http-3A__bit.ly_1RLbfZ9&amp;d=CwMGaQ&amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;r=UbfP45XPC2r-zKffx59NFsiKeZyLNgetH4P83p6_qd4&amp;m=pgZC74lcccP_E5300WmX2eXT4j_PGVeUkmjhpWS_Mms&amp;s=l6oPp1trQY67HUQnw1IVKlsn4Uu2rCfp_C4rAXFvh1M&amp;e=\" rel=\"nofollow,noopener\" ><span class=\"s1\">observed Locky<\/span><\/a>, a new ransomware that mimics Dridex-style distribution. They also\u00a0<a href=\"https:\/\/urldefense.proofpoint.com\/v2\/url?u=http-3A__bit.ly_1Lw5gkn&amp;d=CwMGaQ&amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;r=UbfP45XPC2r-zKffx59NFsiKeZyLNgetH4P83p6_qd4&amp;m=pgZC74lcccP_E5300WmX2eXT4j_PGVeUkmjhpWS_Mms&amp;s=yqO0jJPAsoQyVmvGkQhOeZl1OETjE9HjPzIGbDoe-H8&amp;e=\" rel=\"nofollow,noopener\" ><span class=\"s1\">discovered a new Android Trojan \u201cXbot\u201d<\/span><\/a> that phishes credit cards and bank accounts, and encrypts devices for ransom.<\/p>\n<p class=\"p1\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:13.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10819 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68-500x68.png\" alt=\"blog-title-unit42-500x68\" width=\"500\" height=\"68\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68-230x31.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-title-unit42-500x68-240x33.png 240w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><!--more--><\/p>\n<p class=\"p1\">John A. Davis, Major General (Retired) United States Army, and Vice President and Federal Chief Security Officer (CSO) for Palo Alto Networks, <a href=\"https:\/\/urldefense.proofpoint.com\/v2\/url?u=http-3A__bit.ly_1VkhulH&amp;d=CwMGaQ&amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;r=UbfP45XPC2r-zKffx59NFsiKeZyLNgetH4P83p6_qd4&amp;m=pgZC74lcccP_E5300WmX2eXT4j_PGVeUkmjhpWS_Mms&amp;s=K5QoREL2SFPfBZseYujzqDG8cHkfcCeve3DQTWmbeZw&amp;e=\" rel=\"nofollow,noopener\" ><span class=\"s1\">discussed the first of four imperatives<\/span><\/a> for cybersecurity success in the digital age.<\/p>\n<p class=\"p1\">Greg Day, Palo Alto Networks VP &amp; CSO, EMEA, <a href=\"https:\/\/urldefense.proofpoint.com\/v2\/url?u=http-3A__bit.ly_1QJJMCq&amp;d=CwMGaQ&amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;r=UbfP45XPC2r-zKffx59NFsiKeZyLNgetH4P83p6_qd4&amp;m=pgZC74lcccP_E5300WmX2eXT4j_PGVeUkmjhpWS_Mms&amp;s=FPXHpv02I0ViS-gdGLHGvnJ-vOblnijn1wQ6UnKRsv8&amp;e=\" rel=\"nofollow,noopener\" ><span class=\"s1\">addressed the growing importance of threat DNA<\/span><\/a> in attack techniques.<\/p>\n<p class=\"p1\">Ignite is coming up soon. <a href=\"https:\/\/urldefense.proofpoint.com\/v2\/url?u=http-3A__bit.ly_1SrhX81&amp;d=CwMGaQ&amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;r=UbfP45XPC2r-zKffx59NFsiKeZyLNgetH4P83p6_qd4&amp;m=pgZC74lcccP_E5300WmX2eXT4j_PGVeUkmjhpWS_Mms&amp;s=mra-sx7o0ZT6NxbrIbxa4Ue81_5aFDa0Vm2PptQ4cgo&amp;e=\" rel=\"nofollow,noopener\" ><span class=\"s1\">Find out what\u2019s new<\/span><\/a> at this year\u2019s conference, and watch this video to find out why you don\u2019t want miss it:<\/p>\n<p>\u00a0<div class=\"styleIt\" style=\"width:500px;height:281px;\"><lite-youtube videoid=\"dOQ5-a6z_MM\" ><\/lite-youtube><\/div><\/p>\n<p class=\"p1\"><span class=\"s1\"><a href=\"https:\/\/urldefense.proofpoint.com\/v2\/url?u=https-3A__boom.weboom.com_sites_paloaltonetworks_ignite2016_forms_regform.html&amp;d=CwMGaQ&amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;r=UbfP45XPC2r-zKffx59NFsiKeZyLNgetH4P83p6_qd4&amp;m=pgZC74lcccP_E5300WmX2eXT4j_PGVeUkmjhpWS_Mms&amp;s=zf8Dcla5e8CkPy0Paf6eKKNeE3LpgcLJizeTG-3S540&amp;e=\" rel=\"nofollow,noopener\" >Register<\/a><\/span> for Ignite 2016 today.<\/p>\n<p class=\"p1\">Joerg Sieber <a href=\"https:\/\/urldefense.proofpoint.com\/v2\/url?u=http-3A__bit.ly_1Rn7DfY&amp;d=CwMGaQ&amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;r=UbfP45XPC2r-zKffx59NFsiKeZyLNgetH4P83p6_qd4&amp;m=pgZC74lcccP_E5300WmX2eXT4j_PGVeUkmjhpWS_Mms&amp;s=vtSzklEwlmpow_291j43CM8APMhUK_JN_MGfR89vX1c&amp;e=\" rel=\"nofollow,noopener\" ><span class=\"s1\">talked about why actionable threat intelligence<\/span><\/a> is the key to efficient and comprehensive security.<\/p>\n<p class=\"p1\">Lawrence Chin <a href=\"https:\/\/urldefense.proofpoint.com\/v2\/url?u=http-3A__bit.ly_1RKannC&amp;d=CwMGaQ&amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;r=UbfP45XPC2r-zKffx59NFsiKeZyLNgetH4P83p6_qd4&amp;m=pgZC74lcccP_E5300WmX2eXT4j_PGVeUkmjhpWS_Mms&amp;s=PNpYuhZBhXRBKenJUV2JxQCSOqRXgUpc6uedAJRUiHU&amp;e=\" rel=\"nofollow,noopener\" ><span class=\"s1\">explained how Traps<\/span><\/a> could help prevent successful attacks on legacy ATM endpoints.<\/p>\n<p class=\"p1\">We <a href=\"https:\/\/urldefense.proofpoint.com\/v2\/url?u=http-3A__bit.ly_1QoGEvg&amp;d=CwMGaQ&amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;r=UbfP45XPC2r-zKffx59NFsiKeZyLNgetH4P83p6_qd4&amp;m=pgZC74lcccP_E5300WmX2eXT4j_PGVeUkmjhpWS_Mms&amp;s=K_y9LPxR0SzCun0FuAmgHjJs0EsvYiuSXMNw01Vs04I&amp;e=\" rel=\"nofollow,noopener\" ><span class=\"s1\">published a new episode of People of Palo Alto Networks<\/span><\/a> highlighting Ellison Bailis, Senior Manager of Workplace Design and Planning.<\/p>\n<p class=\"p1\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_Culture_Blog.jpg\"><div style=\"max-width:100%\" data-width=\"498\"><span class=\"ar-custom\" style=\"padding-bottom:54.02%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-10643 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_Culture_Blog.jpg\" alt=\"culture team next gen\" width=\"498\" height=\"269\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_Culture_Blog.jpg 498w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_Culture_Blog-230x124.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_Culture_Blog-74x40.jpg 74w\" sizes=\"auto, (max-width: 498px) 100vw, 498px\" \/><\/span><\/div><\/a><\/p>\n<p class=\"p1\">Palo Alto Networks Academy <a href=\"https:\/\/urldefense.proofpoint.com\/v2\/url?u=http-3A__bit.ly_1TpbUPV&amp;d=CwMGaQ&amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;r=UbfP45XPC2r-zKffx59NFsiKeZyLNgetH4P83p6_qd4&amp;m=pgZC74lcccP_E5300WmX2eXT4j_PGVeUkmjhpWS_Mms&amp;s=B7DzXDEyk8MiBxz-J--TxgmYqkm9ZAzTobgSI9qrCj0&amp;e=\" rel=\"nofollow,noopener\" ><span class=\"s1\">collaborated with VetsinTech<\/span><\/a> to host a product training session exclusively for veterans.<\/p>\n<p class=\"p1\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/vetsintech2.jpeg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:66.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-12224 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/vetsintech2-500x334.jpeg\" alt=\"vetsintech2\" width=\"500\" height=\"334\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/vetsintech2-500x334.jpeg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/vetsintech2-230x153.jpeg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/vetsintech2-450x300.jpeg 450w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/vetsintech2-60x40.jpeg 60w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/vetsintech2.jpeg 1000w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p class=\"p2\"><span class=\"s2\"><a href=\"https:\/\/urldefense.proofpoint.com\/v2\/url?u=http-3A__bit.ly_1OjPpW4&amp;d=CwMGaQ&amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;r=UbfP45XPC2r-zKffx59NFsiKeZyLNgetH4P83p6_qd4&amp;m=pgZC74lcccP_E5300WmX2eXT4j_PGVeUkmjhpWS_Mms&amp;s=9VE2xCwZMIvvmhThqff2Zbc5hkKe2fCwyU8iUnEbhDg&amp;e=\" rel=\"nofollow,noopener\" >Read this week's NextWave Partner Channel Scoop<\/a><\/span><span class=\"s3\">.<\/span><\/p>\n<p class=\"p1\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1.jpg\"><div style=\"max-width:100%\" data-width=\"498\"><span class=\"ar-custom\" style=\"padding-bottom:54.02%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-10802 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1.jpg\" alt=\"PAN_ChannelScoop_Blog\" width=\"498\" height=\"269\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1.jpg 498w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1-230x124.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_ChannelScoop_Blog1-74x40.jpg 74w\" sizes=\"auto, (max-width: 498px) 100vw, 498px\" \/><\/span><\/div><\/a><\/p>\n<p class=\"p1\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:12.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-11218 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62-500x62.jpg\" alt=\"youre invited\" width=\"500\" height=\"62\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62-230x29.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62-240x30.jpg 240w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>Here are\u00a0<a href=\"http:\/\/events.paloaltonetworks.com\/\">upcoming events<\/a>\u00a0around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDk1MQ==\">Virtual Ultimate Test Drive NGFW<\/a><\/p>\n<ul>\n<li>February 22, 2016 11:00 AM - 2:00 PM EST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDkyOQ==\">Virtual Ultimate Test Drive: Next Generation Firewall<\/a><\/p>\n<ul>\n<li>February 22, 2016 1:00 PM - 4:00 PM CET<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNDkzOA==\">Ultimate Test Drive \u2013 Next-Generation Firewall<\/a><\/p>\n<ul>\n<li>February 23, 2016 9:30 AM - 1:00 PM CET<\/li>\n<li>Rome<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNDk1Mg==\">Virtual Ultimate Test Drive TP<\/a><\/p>\n<ul>\n<li>February 23, 2016 11:00 AM - 2:00 PM PST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.brighttalk.com\/webcast\/9591\/190871?utm_source=Tufin&amp;utm_medium=email\/PAN&amp;utm_campaign=PAN%20Webinar%20Feb%2023\" rel=\"nofollow,noopener\" >Security Policy Orchestration for Next-Generation Firewalls &amp; Cloud<\/a><\/p>\n<ul>\n<li>February 23, 2016 12:00 PM \u2013 1:00 PM EST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNDY4NQ==\">2\u670824\u65e5(\u6c34)\u88fd\u54c1\u5c0e\u5165\u30fb\u904b\u7528\u652f\u63f4\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a><\/p>\n<ul>\n<li>February 24, 2016 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>\u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.fuelusergroup.org\/page\/webcasts?utm_campaign=Webcasts&amp;utm_medium=social&amp;utm_source=twitter\" rel=\"nofollow,noopener\" >The Scarlet Mimic Campaign: an Ask the Expert Session with Unit 42<\/a><\/p>\n<ul>\n<li>February 24, 2016 12:00 PM - 1:00 PM CST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDcxNg==\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>February 24, 2016 9:00 AM - 10:00 AM PST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.brighttalk.com\/webcast\/10903\/189523\" rel=\"nofollow,noopener\" >Tackle Your Toughest Security Challenges at Ignite 2016<\/a><\/p>\n<ul>\n<li>February 24, 2016 11:00 AM - 11:30 AM PST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/www.fedinsider.com\/the-cyber-attack-lifecycle-in-government\/\" rel=\"nofollow,noopener\" >The Cyber Attack Lifecycle in Government<\/a><\/p>\n<ul>\n<li>February 24, 2016 2:00 PM - 2:30 PM EST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDk1NA==\">Virtual Ultimate Test Drive NGFW SPANISH<\/a><\/p>\n<ul>\n<li>February 24, 2016 11:00 AM - 2:00 PM CST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNDk1Mw==\">Virtual Ultimate Test Drive VDC<\/a><\/p>\n<ul>\n<li>February 24, 2016 11:00 AM - 2:00 PM EST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/www.fedinsider.com\/disrupting-the-cyber-attack-lifecycle-in-government\/\" rel=\"nofollow,noopener\" >Disrupting the Cyber Attack Lifecycle in Government<\/a><\/p>\n<ul>\n<li>February 24, 2016 2:00 PM - 2:30 PM EST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.brighttalk.com\/webcast\/10903\/189463\" rel=\"nofollow,noopener\" >Cybersecurity for Financial Services Industry<\/a><\/p>\n<ul>\n<li>February 25, 2016 10:00 AM - 11:15 AM GMT<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.brighttalk.com\/webcast\/10903\/191953\" rel=\"nofollow,noopener\" >Flipping the Economics of Attacks<\/a><\/p>\n<ul>\n<li>February 25, 2016 1:00 PM - 2:00 PM EST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNTA5Ng==\">Take the Ultimate Test Drive!<\/a><\/p>\n<ul>\n<li>February 25, 2016 12:00 PM - 3:00 PM CST<\/li>\n<li>Maryland Heights, MO<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDg0OA==\">Ultimate Test Drive - Threat Prevention<\/a><\/p>\n<ul>\n<li>February 25, 2016 9:30 AM - 1:00 PM CET<\/li>\n<li>Issy Les Moulineaux, France<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNTExNA==\">Ultimate Test Drive da Palo Alto Networks<\/a><\/p>\n<ul>\n<li>February 25, 2016 2:00 PM - 6:00 PM GMT-2:00<\/li>\n<li>Juiz De Fora \u2013 MG<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNTAwNw==\">Ultimate Test Drive \u2013 Next-Generation Firewall<\/a><\/p>\n<ul>\n<li>February 25, 2016 9:30 AM - 1:00 PM CET<\/li>\n<li>Madrid<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNDk1NQ==\">Virtual Ultimate Test Drive NGFW<\/a><\/p>\n<ul>\n<li>February 25, 2016 11:00 AM - 2:00 PM PST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDk1Ng==\">Virtual Ultimate Test Drive TP<\/a><\/p>\n<ul>\n<li>February 26, 2016 11:00 AM - 2:00 PM EST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNDgzNQ==\">RSA San Francisco 2016<\/a><\/p>\n<ul>\n<li>February 29, 2016 8:00 AM - 6:30 PM PST<\/li>\n<li>San Francisco, CA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlNDk5Nw==\/?CampaignId=70170000001HcetAAC&amp;referer=null&amp;utm_medium=social-owned-promo&amp;utm_source=Social+Media\">Advanced Endpoint Protection, A Traps Tutorial<\/a><\/p>\n<ul>\n<li>March 2, 2016 11:00 AM-12:00 PM PST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNDgyOQ==\">Brunch &amp; Learn mit Palo Alto Networks in Bern<\/a><\/p>\n<ul>\n<li>March 3, 2016 9:00 AM - 11:30 AM CET<\/li>\n<li>Bern<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNDgwOQ==\">Du er inviteret: Kn\u00e6k koden og modst\u00e5 de mest avancerede angreb<\/a><\/p>\n<ul>\n<li>March 3, 2016 11:00 AM - 12:00 PM CET<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNTEzMw==\">Palo Alto Networks AUTR Report Russian Webinar<\/a><\/p>\n<ul>\n<li>March 3, 2016 10:00 AM - 11:00 AM GMT+3:00<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNTExMQ==\">Traps Demo - Webinaria: Czwartek z Prewencj\u0105<\/a><\/p>\n<ul>\n<li>March 3, 2016 11:00 AM - 12:00 PM CET<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNTA0Ng==\">Virtual Ultimate Test Drive NGFW<\/a><\/p>\n<ul>\n<li>March 3, 2016 11:00 AM - 2:00 PM PST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNTEyMw==\">Die Zwei um Zw\u00f6lf: Cyber Bedrohungen in Echtzeit verhindern!<\/a><\/p>\n<ul>\n<li>March 4, 2016 12:00 PM - 1:00 PM MEZ<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNDk5MA==\">Threat Prevention Ultimate Test Drive - Lowell MA<\/a><\/p>\n<ul>\n<li>March 4, 2016 8:30 AM - 1:00 PM EST<\/li>\n<li>Lowell, MA<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNTA3OA==\">Virtual Ultimate Test Drive NGFW - JAPANESE<\/a><\/p>\n<ul>\n<li>March 4, 2016 11:00 AM - 1:00 PM GMT+8:00<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNTA0Nw==\">Virtual Ultimate Test Drive TP<\/a><\/p>\n<ul>\n<li>March 4, 2016 11:00 AM - 2:00 PM EST<\/li>\n<li>Online Event<\/li>\n<li><\/li>\n<\/ul>\n<p><a href=\"http:\/\/go.paloaltonetworks.com\/ignite2016\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:33.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-12021 size-large lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Ignite-2016-register-now-500x167.png\" alt=\"Ignite 2016 register now\" width=\"500\" height=\"167\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Ignite-2016-register-now-500x167.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Ignite-2016-register-now-230x77.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Ignite-2016-register-now-510x170.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Ignite-2016-register-now-120x40.png 120w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Ignite-2016-register-now.png 900w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here\u2019s all of the top Palo Alto Networks news from this past week. Unit 42 observed Locky, a new ransomware that mimics Dridex-style distribution. They also\u00a0discovered a new Android Trojan \u201cXbot\u201d that &hellip;<\/p>\n","protected":false},"author":156,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203],"tags":[1133,1772,1263,1777],"coauthors":[1546],"class_list":["post-12285","post","type-post","status-publish","format-standard","hentry","category-events","category-news-of-the-week","tag-ignite-2016","tag-locky","tag-palo-alto-networks-academy","tag-xbot"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/12285","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/156"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=12285"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/12285\/revisions"}],"predecessor-version":[{"id":12287,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/12285\/revisions\/12287"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=12285"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=12285"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=12285"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=12285"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}