{"id":15790,"date":"2016-07-16T04:00:13","date_gmt":"2016-07-16T11:00:13","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=15790"},"modified":"2016-07-15T17:26:28","modified_gmt":"2016-07-16T00:26:28","slug":"palo-alto-networks-news-of-the-week-july-16-2016","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/07\/palo-alto-networks-news-of-the-week-july-16-2016\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 July 16, 2016"},"content":{"rendered":"<p>In case you missed it, catch up on all of our top news from this past week right here.<\/p>\n<p>Palo Alto Networks researchers discovered two critical <a href=\"http:\/\/bit.ly\/29OO4xU\" rel=\"nofollow,noopener\"  target=\"_blank\">Internet Explorer<\/a> vulnerabilities.<\/p>\n<p>Unit 42 showed how to track <a href=\"http:\/\/bit.ly\/2a77bkA\" rel=\"nofollow,noopener\"  target=\"_blank\">actors behind keyloggers<\/a> using embedded credentials.<\/p>\n<p>We announced\u00a0that <a href=\"http:\/\/bit.ly\/29K2cFm\" rel=\"nofollow,noopener\"  target=\"_blank\">LabyREnth<\/a>, Unit 42's CTF challenge, is now open to the public and ready to test your malware analysis and reverse engineering skills.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/06\/palo-alto-networks-news-of-the-week-june-25-2016\/unit-42-banner-1-2\/\" rel=\"attachment wp-att-14989\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:13.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-14989 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/Unit-42-banner-1-2-500x68.png\" alt=\"Unit-42-banner-1 (2)\" width=\"500\" height=\"68\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/Unit-42-banner-1-2.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/Unit-42-banner-1-2-230x31.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/Unit-42-banner-1-2-240x33.png 240w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><!--more--><\/p>\n<p>We announced our first 35 <a href=\"http:\/\/bit.ly\/2a1UivU\" rel=\"nofollow,noopener\"  target=\"_blank\">NextWave Traps Specialized<\/a> partners!<\/p>\n<p>Jon Oltsik reviewed Steven Levy\u2019s book, \"<a href=\"http:\/\/bit.ly\/29YbhyY\" rel=\"nofollow,noopener\"  target=\"_blank\">Crypto: How the Code Rebels Beat the Government \u2013 Saving Privacy in the Digital Age<\/a>\u201d for the Cybersecurity Canon.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/07\/the-cybersecurity-canon-crypto-how-the-code-rebels-beat-the-government-saving-privacy-in-the-digital-age\/cybersec-canon-red-500x218-2\/\" rel=\"attachment wp-att-15556\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:43.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-15556 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/07\/cybersec-canon-red-500x218-500x218.png\" alt=\"cybersec-canon-red-500x218\" width=\"500\" height=\"218\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/07\/cybersec-canon-red-500x218.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/07\/cybersec-canon-red-500x218-230x100.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/07\/cybersec-canon-red-500x218-92x40.png 92w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p><a href=\"http:\/\/bit.ly\/29PWDrm\" rel=\"nofollow,noopener\"  target=\"_blank\">User-based controls<\/a> are critical to your breach prevention strategy. We shared two high-profile, real-world breaches that you can learn from.<\/p>\n<p>Financial Services security architect, Lawrence Chin, offered up <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/07\/preventive-actions-in-the-aftermath-of-a-major-bank-breach\/\" target=\"_blank\">preventive actions<\/a> for financial institutions in the aftermath of a major bank breach.<\/p>\n<p>Excited for <a href=\"http:\/\/bit.ly\/29yDLAa\" rel=\"nofollow,noopener\"  target=\"_blank\">Mr. Robot season_2.0<\/a>? We think it\u2019s a good time to talk about preventive security.<\/p>\n<p>Tech Docs: Learn how to simplify policy management using a <a href=\"http:\/\/bit.ly\/29szjmi\" rel=\"nofollow,noopener\"  target=\"_blank\">Panorama<\/a> device group hierarchy.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/05\/tech-doc-autofocus-pro-tip-quick-search\/techdocs_logo_lrg_final1\/\" rel=\"attachment wp-att-14148\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:30.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-14148 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/05\/TechDocs_logo_lrg_final1-500x153.jpg\" alt=\"TechDocs_logo_lrg_final[1]\" width=\"500\" height=\"153\" \/><\/span><\/div><\/a><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/12\/palo-alto-networks-news-of-the-week-december-5\/phpthumb_generated_thumbnailjpg-500x62\/\" rel=\"attachment wp-att-11218\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:12.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-11218 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62-500x62.jpg\" alt=\"youre invited\" width=\"500\" height=\"62\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62-230x29.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/12\/phpThumb_generated_thumbnailjpg-500x62-240x30.jpg 240w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Here Are\u00a0<a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\">Upcoming Events<\/a>\u00a0around the world that you should know about and don\u2019t forget to register for our new <a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/event-calendar\" target=\"_blank\">events calendar<\/a>!<\/p>\n<p><a href=\"https:\/\/get.info.paloaltonetworks.com\/webApp\/preventionweek\" target=\"_blank\">Breach Prevention Week<\/a><\/p>\n<ul>\n<li>July 18, 2016 - July 22, 2016<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/190747\" target=\"_blank\">Advanced Endpoint Protection: A Palo Alto Networks Ultimate Test Drive Event<\/a><\/p>\n<ul>\n<li>July 20, 2016<\/li>\n<li>Toronto, ON<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNTc3Mg==\" target=\"_blank\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>July 20, 2016 9:00 AM - 10:00 AM PST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNTY2NQ==\" target=\"_blank\">Virtual Ultimate Test Drive NGFW July 20th, 2016 - SPANISH<\/a><\/p>\n<ul>\n<li>July 20, 2016 11:00 AM - 2:00 PM CST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNTU0Nw==\" target=\"_blank\">Advanced Endpoint Protection, Live Demo<\/a><\/p>\n<ul>\n<li>July 21, 2016 11:00 AM - 12:00 PM MEZ<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlNTc0Ng==\" target=\"_blank\">Advanced Endpoint Protection, A Traps Tutorial<\/a><\/p>\n<ul>\n<li>July 27, 2016 11:00 AM - 12:00 PM PST<\/li>\n<li>Online Event<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/184093\" target=\"_blank\">Breach Prevention Meets Suicide Squad<\/a><\/p>\n<ul>\n<li>August 5, 2016<\/li>\n<li>Phoenix, AZ<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>In case you missed it, catch up on all of our top news from this past week right here. Palo Alto Networks researchers discovered two critical Internet Explorer vulnerabilities. Unit 42 showed &hellip;<\/p>\n","protected":false},"author":156,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203],"tags":[1918,251,240,1091,1225,46,145,355,2296,613,412],"coauthors":[1546],"class_list":["post-15790","post","type-post","status-publish","format-standard","hentry","category-events","category-news-of-the-week","tag-breach-prevention","tag-cybersecurity-canon","tag-internet-explorer","tag-jon-oltsik","tag-keylogger","tag-microsoft","tag-next-generation-firewall","tag-nextwave","tag-nextwave-traps-specialized","tag-panorama","tag-user-id"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/15790","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/156"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=15790"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/15790\/revisions"}],"predecessor-version":[{"id":15796,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/15790\/revisions\/15796"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=15790"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=15790"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=15790"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=15790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}