{"id":14808,"date":"2016-06-18T04:00:55","date_gmt":"2016-06-18T11:00:55","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=14808"},"modified":"2016-06-20T10:20:39","modified_gmt":"2016-06-20T17:20:39","slug":"palo-alto-networks-news-of-the-week-june-18","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/06\/palo-alto-networks-news-of-the-week-june-18\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 June 18"},"content":{"rendered":"<p>Here\u2019s all of our top news from the past week.<\/p>\n<p>Unit 42 identified a spear phishing attack from the <a href=\"http:\/\/bit.ly\/25TVIyD\" rel=\"nofollow,noopener\"  target=\"_blank\">Sofacy group<\/a> targeting the United States government. The news was covered by <a href=\"http:\/\/www.securityweek.com\/sofacy-threat-group-targets-us-government\" rel=\"nofollow,noopener\"  target=\"_blank\">SecurityWeek<\/a> and <a href=\"http:\/\/arstechnica.com\/security\/2016\/06\/hackers-invade-dems-servers-steal-entire-trump-opposition-file\/\" rel=\"nofollow,noopener\"  target=\"_blank\">Ars Technica<\/a>,\u00a0among others.<\/p>\n<p>We also extended\u00a0AutoFocus threat intelligence with <a href=\"http:\/\/bit.ly\/1WS4U1n\" rel=\"nofollow,noopener\" >new tag types<\/a>.<\/p>\n<p>Palo Alto Networks researcher Tao Yan was credited with the discovery of three new critical <a href=\"http:\/\/bit.ly\/1USaZob\" rel=\"nofollow,noopener\"  target=\"_blank\">Microsoft vulnerabilities<\/a> in June\u2018s Microsoft Security bulletin.<\/p>\n<p>We also extended\u00a0AutoFocus threat intelligence with new <a href=\"http:\/\/bit.ly\/1WS4U1n\" rel=\"nofollow,noopener\"  target=\"_blank\">tag types<\/a>.<\/p>\n<p>We shared how to keep up with Palo Alto Networks threat intelligence and receive updates from the <a href=\"http:\/\/bit.ly\/21neW97\" rel=\"nofollow,noopener\"  target=\"_blank\">Unit 42 threat intelligence blog in real time<\/a>.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/Unit-42-banner-1.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:13.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"size-large wp-image-14586 aligncenter lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/Unit-42-banner-1-500x68.png\" alt=\"Unit-42-banner-1\" width=\"500\" height=\"68\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/Unit-42-banner-1.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/Unit-42-banner-1-230x31.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/Unit-42-banner-1-240x33.png 240w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><!--more--><\/p>\n<p>Palo Alto Networks CSO-EMEA Greg Day shared interesting trends and top discoveries from this year\u2019s <a href=\"http:\/\/bit.ly\/1UyPrkw\" rel=\"nofollow,noopener\"  target=\"_blank\">Infosecurity Europe<\/a>.<\/p>\n<p><div class=\"styleIt\" style=\"width:500px;height:315px;\"><lite-youtube videoid=\"r5RblV1pJOQ\" ><\/lite-youtube><\/div><\/p>\n<p>Is that you we saw at <a href=\"http:\/\/bit.ly\/1Px1mK8\" rel=\"nofollow,noopener\"  target=\"_blank\">Palo Alto Networks Day Japan<\/a>? Watch scenes from our record-breaking event.<\/p>\n<p>Steve Gerrard explained how <a href=\"http:\/\/bit.ly\/1UvDatg\" rel=\"nofollow,noopener\"  target=\"_blank\">conventional AV systems<\/a> can actually harm you.<\/p>\n<p>We introduced you to <a href=\"http:\/\/bit.ly\/24A4Mml\" rel=\"nofollow,noopener\"  target=\"_blank\">Ilan from Palo Alto Networks Israel<\/a> &amp; shared what he enjoys most about his work on our R&amp;D team.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_Culture_Blog.jpg\"><div style=\"max-width:100%\" data-width=\"498\"><span class=\"ar-custom\" style=\"padding-bottom:54.02%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-10643 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_Culture_Blog.jpg\" alt=\"culture team next gen\" width=\"498\" height=\"269\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_Culture_Blog.jpg 498w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_Culture_Blog-230x124.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/PAN_Culture_Blog-74x40.jpg 74w\" sizes=\"auto, (max-width: 498px) 100vw, 498px\" \/><\/span><\/div><\/a><\/p>\n<p>Read the latest Customer Spotlight to learn how <a href=\"http:\/\/bit.ly\/1Ot4NGO\" rel=\"nofollow,noopener\"  target=\"_blank\">Warren Rogers achieved PCI compliance<\/a> in its cloud-based data center with the Palo Alto Networks Next-Generation Security Platform.<\/p>\n<p>We shared our whitepaper offering insights into how you can <a href=\"http:\/\/bit.ly\/1tx27yH\" rel=\"nofollow,noopener\"  target=\"_blank\">secure data in the data center<\/a> by reducing the attack surface and preventing threats.<em>\u00a0<\/em><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:12.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-11218 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62-500x62.jpg\" alt=\"youre invited\" width=\"500\" height=\"62\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62-230x29.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62-240x30.jpg 240w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Here are\u00a0<a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\">upcoming events<\/a>\u00a0around the world that you should know about:<\/p>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNTU5Nw==\" target=\"_blank\">Palo Alto Networks -Virtual Ultimate Test Drive NGFW June20,2016<\/a><\/p>\n<ul>\n<li>June 20, 2016 11:00 AM - 1:00 PM GMT+8:00<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNTY4Nw==\" target=\"_blank\">Lunch &amp; Learn Ransomware: Sett i et st\u00f8rre perspektiv<\/a><\/p>\n<ul>\n<li>June 21, 2016 12:30 PM - 2:30 PM CET<\/li>\n<li>Oslo<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNTU2OA==\" target=\"_blank\">Lunch &amp; Learn Ransomware: Putting it into Perspective<\/a><\/p>\n<ul>\n<li>June 22, 2016 12:30 PM - 2:30 PM CET<\/li>\n<li>Copenhagen<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNTU5OA==\" target=\"_blank\">Palo Alto Networks - Virtual Ultimate Test Drive TP June 22, 2016<\/a><\/p>\n<ul>\n<li>June 22, 2016 1:00 PM - 3:00 PM GMT+8:00<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNTU4NQ==\" target=\"_blank\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>June 22, 2016 9:00 AM - 10:00 AM PST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNTc1NA==\" target=\"_blank\">TechWave Elite 2016 - London<\/a><\/p>\n<ul>\n<li>June 22, 2016 10:00 AM - 4:00 PM GMT<\/li>\n<li>London<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNTYxNg==\" target=\"_blank\">Virtual Ultimate Test Drive NGFW June 22nd, 2016 - SPANISH<\/a><\/p>\n<ul>\n<li>June 22, 2016 11:00 AM - 2:00 PM CST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNTc1NQ==\" target=\"_blank\">How to Protect Your SCADA System with Palo Alto Networks<\/a><\/p>\n<ul>\n<li>June 23, 2016 11:00 AM - 12:00 PM GMT+3:00<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNTcyNg==\" target=\"_blank\">Live-Demo f\u00fcr einen erweiterten Endpunkt-Schutz<\/a><\/p>\n<ul>\n<li>June 23, 2016 10:00 AM - 11:00 AM MEZ<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNTU5OQ==\" target=\"_blank\">Virtual Ultimate Test Drive AEP June 23, 2016<\/a><\/p>\n<ul>\n<li>June 23, 2016 11:00 AM - 1:00 PM GMT+8:00<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNTc2MA==\" target=\"_blank\">Palo Alto Networks Cybersecurity dla Data Center<\/a><\/p>\n<ul>\n<li>June 24, 2016 11:00 AM - 12:00 PM EET<\/li>\n<li>Online Event<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Here\u2019s all of our top news from the past week. Unit 42 identified a spear phishing attack from the Sofacy group targeting the United States government. The news was covered by SecurityWeek &hellip;<\/p>\n","protected":false},"author":156,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203],"tags":[1132,775,1770,2139],"coauthors":[1546],"class_list":["post-14808","post","type-post","status-publish","format-standard","hentry","category-events","category-news-of-the-week","tag-autofocus","tag-microsoft-security-bulletin","tag-sofacy","tag-warren-rogers"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/14808","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/156"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=14808"}],"version-history":[{"count":6,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/14808\/revisions"}],"predecessor-version":[{"id":14835,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/14808\/revisions\/14835"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=14808"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=14808"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=14808"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=14808"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}