{"id":6499,"date":"2014-08-22T14:00:51","date_gmt":"2014-08-22T21:00:51","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=6499"},"modified":"2021-03-22T08:39:14","modified_gmt":"2021-03-22T15:39:14","slug":"palo-alto-networks-news-week-august-22","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/08\/palo-alto-networks-news-week-august-22\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 August 22"},"content":{"rendered":"<p>Here\u2019s a roundup of this week\u2019s top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/news-of-the-week\/\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks news<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/bit.ly\/1mSn6Sc\" target=\"_blank\" rel=\"noopener\">Insecure Internal Storage in Android<\/a>: Palo Alto Networks researcher Claud Xiao demonstrates how an attacker can bypass Android protection to gain access to usernames, passwords and other data.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:20.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-6436 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Untitled1-500x101.png\" alt=\"Untitled\" width=\"500\" height=\"101\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Untitled1-500x101.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Untitled1-230x46.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Untitled1-510x103.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Untitled1-196x40.png 196w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Untitled1.png 997w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>Palo Alto Networks examines the <a href=\"http:\/\/bit.ly\/1qr3uWh\" target=\"_blank\" rel=\"noopener\">CHS breach and Heartbleed exploitation<\/a>, another example that reiterates how serious this vulnerability is and how critical protection against it remains.<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p>Last week we reported on attacks observed against East Asia that used Google Code for command and control (C2). As follow-on to that work, we pivoted on the C2 indicators of compromise within our WildFire platform, looking for additional malicious activity. <a href=\"http:\/\/bit.ly\/1tmJSH1\" target=\"_blank\" rel=\"noopener\">Check out the sample that caught our attention<\/a>.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:39.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-6482 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/evil-2-500x199.jpg\" alt=\"evil 2\" width=\"500\" height=\"199\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/evil-2-500x199.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/evil-2-230x91.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/evil-2-510x203.jpg 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/evil-2-100x40.jpg 100w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/evil-2.jpg 868w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/08\/look-back-unit-42\/\" target=\"_blank\" rel=\"noopener\">Take a look back<\/a> at the announcement of Unit 42, the release of its 419 Evolution report and the threat intelligence team\u2019s appearance at Black Hat.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:13.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-6321 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/blog-title-unit42-500x68.png\" alt=\"blog-title-unit42\" width=\"500\" height=\"68\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/blog-title-unit42-500x68.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/blog-title-unit42-230x31.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/blog-title-unit42-510x69.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/blog-title-unit42-240x32.png 240w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/blog-title-unit42.png 632w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>Find out what the <a href=\"http:\/\/bit.ly\/YwmyMq\" target=\"_blank\" rel=\"noopener\">expansion of our Global Distribution Agreement with Westcon Group<\/a> means for Palo Alto Networks and our customers.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"125\"><span class=\"ar-custom\" style=\"padding-bottom:80%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-6500 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/panw_westcon.png\" alt=\"panw_westcon\" width=\"125\" height=\"100\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/panw_westcon.png 125w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/panw_westcon-50x40.png 50w\" sizes=\"auto, (max-width: 125px) 100vw, 125px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<p>Next week we\u2019ll gather in San Francisco for VMworld. <a href=\"http:\/\/bit.ly\/1rir49s\" target=\"_blank\" rel=\"noopener\">Here\u2019s a quick glimpse of where we\u2019ll be<\/a>, including our scheduled live demonstrations, presentations from Nir Zuk, and more. You can also experience our integration with VMware NSX up close and personal to <a href=\"http:\/\/bit.ly\/1sZ275R\" target=\"_blank\" rel=\"noopener\">find out how<\/a> Palo Alto Networks Next-Generation Firewalls secure the software-defined data center.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:27%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-6346 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/PANW-at-vmworld-500x135.png\" alt=\"PANW at vmworld\" width=\"500\" height=\"135\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/PANW-at-vmworld-500x135.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/PANW-at-vmworld-230x62.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/PANW-at-vmworld-510x137.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/PANW-at-vmworld-148x40.png 148w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/PANW-at-vmworld.png 888w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>We\u2019re a finalist for five categories in this year\u2019s Computing Security Awards, including Security Company of the Year and New Product of the Year! <a href=\"http:\/\/bit.ly\/1nWZew5\" target=\"_blank\" rel=\"noopener\">Vote Palo Alto Networks today<\/a>.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/08\/like-technology-vote-palo-alto-networks\/\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:31.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-6428 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/EBA6A446-C190-439C-9DFB-A5B9FA84253227.png\" alt=\"EBA6A446-C190-439C-9DFB-A5B9FA842532[27]\" width=\"500\" height=\"158\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/EBA6A446-C190-439C-9DFB-A5B9FA84253227.png 406w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/EBA6A446-C190-439C-9DFB-A5B9FA84253227-230x72.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/EBA6A446-C190-439C-9DFB-A5B9FA84253227-126x40.png 126w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>Check out <a href=\"http:\/\/bit.ly\/1m2zzCD\" target=\"_blank\" rel=\"noopener\">Rene Bonvanie's podcast with Crimson Marketing<\/a> examining the five uses of marketing analytics to increase revenue.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"200\"><span class=\"ar-custom\" style=\"padding-bottom:140%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-6447 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/R_Bonvanie_1-230x322.jpg\" alt=\"R_Bonvanie_1\" width=\"200\" height=\"280\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/R_Bonvanie_1-230x322.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/R_Bonvanie_1-500x700.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/R_Bonvanie_1-214x300.jpg 214w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/R_Bonvanie_1-28x40.jpg 28w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/R_Bonvanie_1.jpg 1500w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<p>Rick Howard spoke with Help Net Security during Black Hat USA 2014 to discuss the ever-<a href=\"http:\/\/bit.ly\/1pj7DPZ\" target=\"_blank\" rel=\"noopener\">changing role of the CSO at the executive level<\/a>.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"200\"><span class=\"ar-custom\" style=\"padding-bottom:100%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-6489 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Howard-Rick.jpg\" alt=\"Howard, Rick\" width=\"200\" height=\"200\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Howard-Rick.jpg 200w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Howard-Rick-100x100.jpg 100w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Howard-Rick-40x40.jpg 40w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noopener\">upcoming events<\/a> around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjI3NQ==\" target=\"_blank\" rel=\"noopener\">VMworld San Francisco<\/a><\/p>\n<ul>\n<li>When: August 24, 2014 from 4:00 PM - 7:00 PM PST<\/li>\n<li>Where: San Francisco, CA<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjIyNg==\" target=\"_blank\" rel=\"noopener\">2014 Cyber, Identity and Financial Threats Symposium<\/a><\/p>\n<ul>\n<li>When: August 26, 2014 from 8:30 AM - 5:30 PM GMT+10:00<\/li>\n<li>Where: Sanctuary Cove, QLD<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjMzOQ==\" target=\"_blank\" rel=\"noopener\">Demo - n\u00e4e mit\u00e4 seuraavan sukupolven tietoturva tarkoittaa k\u00e4yt\u00e4nn\u00f6ss\u00e4<\/a> [Finnish]<\/p>\n<ul>\n<li>When: August 26, 2014 from 3:00 PM - 4:00 PM EET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjM1Mw==\" target=\"_blank\" rel=\"noopener\">Expose the Underground<\/a> [Dutch]<\/p>\n<ul>\n<li>When: August 26, 2014 from 9:00 AM - 2:00 PM CET<\/li>\n<li>Where: Zwolle<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjMyMQ==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks demo - n\u00e4e mit\u00e4 seuraavan sukupolven tietoturva tar<\/a> [Finnish]<\/p>\n<ul>\n<li>When: August 26, 2014 from 3:00 PM - 4:00 PM EET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjI5OQ==\" target=\"_blank\" rel=\"noopener\">The Fraud &amp; Cyber Crime Group Symposium<\/a><\/p>\n<ul>\n<li>When: August 26, 2014 from 7:00 AM - 5:00 PM GMT+10:00<\/li>\n<li>Where: Gold Coast, QLD<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjMwNw==\" target=\"_blank\" rel=\"noopener\">Get Your Network up to Speed<\/a><\/p>\n<ul>\n<li>When: August 27, 2014 from 10:30 AM - 2:30 PM EST<\/li>\n<li>Where: Jessup, MD<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjM0Mw==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: August 27, 2014 from 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQwMQ==\" target=\"_blank\" rel=\"noopener\">From Simple Scams to Silver Spaniel Attacks<\/a><\/p>\n<ul>\n<li>When: August 28, 2014 from 11:00 AM - 12:00 PM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjM2Mg==\" target=\"_blank\" rel=\"noopener\">Opplev styrken i Next-Generation Brannmurer<\/a> [Norwegian]<\/p>\n<ul>\n<li>When: September 3, 2014 from 1:00 PM - 2:00 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p style=\"text-align: left;\"><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjQwNA==\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: September 3, 2014 from 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here\u2019s a roundup of this week\u2019s top Palo Alto Networks news. &nbsp; &nbsp; Insecure Internal Storage in Android: Palo Alto Networks researcher Claud Xiao demonstrates how an attacker can bypass Android protection &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203],"tags":[581,172,621,619,400,622,168,627],"coauthors":[709],"class_list":["post-6499","post","type-post","status-publish","format-standard","hentry","category-events","category-news-of-the-week","tag-419-evolution","tag-android","tag-computing-security-awards","tag-google-code","tag-heartbleed","tag-podcast","tag-vmworld","tag-westcon-group"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6499","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=6499"}],"version-history":[{"count":8,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6499\/revisions"}],"predecessor-version":[{"id":128784,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6499\/revisions\/128784"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=6499"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=6499"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=6499"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=6499"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}