{"id":39583,"date":"2017-08-05T04:00:12","date_gmt":"2017-08-05T11:00:12","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=39583"},"modified":"2017-08-04T09:00:38","modified_gmt":"2017-08-04T16:00:38","slug":"palo-alto-networks-news-week-august-5-2017","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2017\/08\/palo-alto-networks-news-week-august-5-2017\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 August 5, 2017"},"content":{"rendered":"<p>Did you miss any of this week\u2019s Palo Alto Networks action? Don\u2019t worry \u2013 we\u2019ve rounded up our top news and views right here:<\/p>\n<ul>\n<li>Palo Alto Networks Unit 42 threat intelligence team shared new research:\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/07\/unit42-twoface-webshell-persistent-access-point-lateral-movement\/\">TwoFace Webshell: Persistent Access Point for Lateral Movement<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/08\/unit42-prince-persia-ride-lightning-infy-returns-foudre\/\">Prince of Persia \u2013 Ride the Lightning: Infy returns as \u201cFoudre\u201d<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Unit 42 revealed the <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/08\/unit42-labyrenth-ctf-2017-winners\/\">LabyREnth CTF winners and important stats<\/a> from this year\u2019s competition.<\/li>\n<li>Did you hear? AV-TEST concluded that <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/08\/av-test-validated-traps-can-replace-legacy-antivirus\/\">Traps can replace legacy antivirus<\/a>.<\/li>\n<li>Terry Young shared how <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/08\/sp-whodunit-know-your-network-attackers\/\">Palo Alto Networks can provide better visibility into threats<\/a> for mobile service operators.<\/li>\n<li>Brian Tokuyoshi looked into <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/08\/globalprotect-clientless-vpn-now-expanded-access-applications\/\">GlobalProtect Clientless VPN and its expanded access to applications.<\/a><\/li>\n<\/ul>\n<p>Take a look at <a href=\"http:\/\/events.paloaltonetworks.com\/\">upcoming events<\/a> around the world that you should know about. Don\u2019t forget to register for our <a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/event-calendar\">events calendar<\/a>!<\/p>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/267364\">Virtual Ultimate Test Drive - Next Generation Firewall<\/a><\/p>\n<ul>\n<li>August 7, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/267365\">Get \u201cHands On\u201d With the VM-Series on Microsoft Azure<\/a><\/p>\n<ul>\n<li>August 8, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/240711\">NGFW: Next Generation Firewall Live Demo<\/a><\/p>\n<ul>\n<li>August 9, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/267366\">Virtual Ultimate Test Drive - Threat Prevention<\/a><\/p>\n<ul>\n<li>August 9, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/267780\">Higher Education: Automate Breach Detection<\/a><\/p>\n<ul>\n<li>August 9, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/267367\">Virtual Ultimate Test Drive - Virtualized Data Center<\/a><\/p>\n<ul>\n<li>August 10, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/264993\">Eat &amp; Learn: Threat Intelligence at Work<\/a><\/p>\n<ul>\n<li>August 10, 2017<\/li>\n<li>Sydney, Australia<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/267962\">Palo Alto Networks' Customer Appreciation Happy Hour<\/a><\/p>\n<ul>\n<li>August 10, 2017<\/li>\n<li>Greenwood Village, CO<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/267368\">Virtual Ultimate Test Drive - Advanced Endpoint Protection<\/a><\/p>\n<ul>\n<li>August 11, 2017<\/li>\n<li>Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/signup.paloaltonetworks.com\/ehome\/264994\">Eat &amp; Learn: Threat Intelligence at Work<\/a><\/p>\n<ul>\n<li>August 11, 2017<\/li>\n<li>Brisbane Australia<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Catch up on the top Palo Alto Networks news of the week.<\/p>\n","protected":false},"author":153,"featured_media":20592,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[203],"tags":[4153,403,4129,4162,3743,4126,778,4165,586],"coauthors":[1515],"class_list":["post-39583","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-of-the-week","tag-av-test","tag-events-2","tag-foudre","tag-globalprotect-clientless-vpn","tag-labyrenth-ctf","tag-prince-of-persia","tag-traps","tag-twoface-webshell","tag-unit-42"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-generic-banner.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/39583","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=39583"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/39583\/revisions"}],"predecessor-version":[{"id":39586,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/39583\/revisions\/39586"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/20592"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=39583"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=39583"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=39583"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=39583"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}