{"id":7835,"date":"2015-01-10T05:00:25","date_gmt":"2015-01-10T13:00:25","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=7835"},"modified":"2015-12-08T16:43:45","modified_gmt":"2015-12-09T00:43:45","slug":"palo-alto-networks-news-week-january-10","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/01\/palo-alto-networks-news-week-january-10\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 January 10"},"content":{"rendered":"<p>Here is the top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/news-of-the-week\/\" target=\"_blank\">Palo Alto Networks news<\/a> from this past week.<\/p>\n<p>&nbsp;<\/p>\n<p>Palo Alto Networks researchers <a href=\"http:\/\/bit.ly\/1wcGRZe\" rel=\"nofollow,noopener\"  target=\"_blank\">analyze<\/a> Anunak &amp; Chthonic malicious campaigns, and possible prevention using Traps, our Advanced Endpoint Protection solution.<\/p>\n<p>Check out this <a href=\"http:\/\/bit.ly\/1vUdsSo\" rel=\"nofollow,noopener\"  target=\"_blank\">deep dive analysis<\/a> of Android system service vulnerability CVE-2014-7911 &amp; exploitation.<!--more--><\/p>\n<p>We <a href=\"http:\/\/bit.ly\/14smLU6\" rel=\"nofollow,noopener\"  target=\"_blank\">examine<\/a> the methods of operation for common ransomware samples and a possible solution using Advanced Endpoint Protection that, based on our lab tests, would have blocked the ransomware families and prevented malicious activity.<\/p>\n<p>Our mission at this year's <a href=\"https:\/\/www.paloaltonetworks.com\/content\/campaigns\/ignite\/2015\/index.html\" target=\"_blank\">Ignite Conference<\/a> is to empower you with knowledge you can rely on to separate fact from fiction, so we\u2019ve called in surprise experts to assist at the Ignite evening event happening March 31st. <a href=\"http:\/\/bit.ly\/1w1dTKJ\" rel=\"nofollow,noopener\"  target=\"_blank\">Find out more here<\/a>.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:34%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7823 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/PAN_IC15_linkedin_646x220-500x170.jpg\" alt=\"PAN_IC15_linkedin_646x220\" width=\"500\" height=\"170\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/PAN_IC15_linkedin_646x220-500x170.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/PAN_IC15_linkedin_646x220-230x78.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/PAN_IC15_linkedin_646x220-510x173.jpg 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/PAN_IC15_linkedin_646x220-117x40.jpg 117w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/01\/PAN_IC15_linkedin_646x220.jpg 646w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>The Ignite deadline for <a href=\"http:\/\/bit.ly\/1wtzm4b\" rel=\"nofollow,noopener\"  target=\"_blank\">the Call for Papers<\/a> is <strong>January 18<\/strong>! If you\u2019ve got strong content to share on \u201cwar stories\u201d of enterprise security deployment, new threat research, technical best practices, or a detailed how-to, we want to hear from you \u2013 submit before next Sunday.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:30.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7424 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/email_CFP-banner_PAN_IC15_660x200-500x151.jpg\" alt=\"ignite cfp\" width=\"500\" height=\"151\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/email_CFP-banner_PAN_IC15_660x200-500x151.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/email_CFP-banner_PAN_IC15_660x200-230x69.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/email_CFP-banner_PAN_IC15_660x200-510x154.jpg 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/email_CFP-banner_PAN_IC15_660x200-132x40.jpg 132w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/email_CFP-banner_PAN_IC15_660x200.jpg 660w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p><a href=\"http:\/\/bit.ly\/1IwXox0\" rel=\"nofollow,noopener\"  target=\"_blank\">Find out how to vote<\/a> on which books you want to see join Parmy Olson\u2019s We Are Anonymous in the Cybersecurity Canon. Don\u2019t see your favorite cybersecurity book on the\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/content\/paloaltonetworks-com\/global\/en_US\/index\/threat-research\/cybercanon.html\" target=\"_blank\">candidate list<\/a>? You should\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/12\/whats-favorite-cybersecurity-book-maybe-canon\/\" target=\"_blank\">submit it for consideration<\/a>.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:60.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-6541 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Updated-Cybersecurity-Canon-Banner-500x303.png\" alt=\"Updated Cybersecurity Canon Banner\" width=\"500\" height=\"303\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Updated-Cybersecurity-Canon-Banner-500x303.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Updated-Cybersecurity-Canon-Banner-230x139.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Updated-Cybersecurity-Canon-Banner-493x300.png 493w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Updated-Cybersecurity-Canon-Banner-65x40.png 65w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/Updated-Cybersecurity-Canon-Banner.png 862w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p><a href=\"http:\/\/bit.ly\/1Bvb1wa\" rel=\"nofollow,noopener\"  target=\"_blank\">Head here<\/a> to see a document highlighting survey results from Forrester Research that illustrate the total economic impact (TEI) of an Enterprise Security Platform and its fundamental advantages over a collection of point products.<\/p>\n<p><a href=\"http:\/\/bit.ly\/1Dz2szX\" rel=\"nofollow,noopener\"  target=\"_blank\">Tips and tricks<\/a> from the Palo Alto Networks technical documentations team on PAN-OS 6.1, including the Administrator's Guide and 9 interesting features &amp; topics to check out.<\/p>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\">upcoming events<\/a> around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjU2Mg==\" target=\"_blank\">1\u670814\u65e5(\u6c34)\u88fd\u54c1\u5b9f\u611f\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e(\u540d\u53e4\u5c4b)<\/a> [Japanese]<\/p>\n<ul>\n<li>When: January 14, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u540d\u53e4\u5c4b\u5e02\u4e2d\u6751\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjgxNA==\" target=\"_blank\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: January 14, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjc2Ng==\" target=\"_blank\">Palo Alto's Next-Generation Security - Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>When: January 14, 2015 9:00 AM - 1:00 PM EST<\/li>\n<li>Where: Hanover, MD<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjc1MA==\" target=\"_blank\">UK TechWave<\/a><\/p>\n<ul>\n<li>When: January 14, 2015 12:00 PM - 5:30 PM GMT<\/li>\n<li>Where: London<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjY4Mg==\" target=\"_blank\">Demo - n\u00e4e mit\u00e4 seuraavan sukupolven tietoturva ta<\/a> [Finnish]<\/p>\n<ul>\n<li>When: January 15, 2015 1:00 PM - 2:00 PM EET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjc1MQ==\" target=\"_blank\">TechWave Elite UK<\/a><\/p>\n<ul>\n<li>When: January 15, 2015 12:00 PM - 5:30 PM GMT<\/li>\n<li>Where: London<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjU1OQ==\" target=\"_blank\">1\u670816\u65e5(\u91d1)\u88fd\u54c1\u5b9f\u611f\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a> [Japanese]<\/p>\n<ul>\n<li>When: January 16, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjg2Nw==\" target=\"_blank\">Rethinking Mobile Security<\/a><\/p>\n<ul>\n<li>When: January 20, 2015 11:00 AM - 12:00 PM GMT+4:00<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjU2NQ==\" target=\"_blank\">1\u670821\u65e5(\u6c34)\u88fd\u54c1\u5c0e\u5165\u30fb\u904b\u7528\u652f\u63f4\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a> [Japanese]<\/p>\n<ul>\n<li>When: January 21, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjU5MA==\" target=\"_blank\">Next-Generation Firewall Live Demo Webinar<\/a> [Dutch]<\/p>\n<ul>\n<li>When: January 21, 2015 1:00 PM - 2:00 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjgxNQ==\" target=\"_blank\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: January 21, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjc4MA==\" target=\"_blank\">Threat Prevention Ultimate Test Drive<\/a><\/p>\n<ul>\n<li>When: January 21, 2015 10:00 AM - 1:00 PM GMT<\/li>\n<li>Where: London<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjg3MA==\" target=\"_blank\">Financial Services focused happy hour event<\/a><\/p>\n<ul>\n<li>When: January 22, 2015 4:00 PM - 6:00 PM EST<\/li>\n<li>Where: New York, NY<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjg1Mw==\" target=\"_blank\">You Can Have It All - Transforming the Virtualized Datacenter<\/a><\/p>\n<ul>\n<li>When: January 22, 2015 11:00 AM - 12:00 PM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjg0OA==\" target=\"_blank\">1\u670823\u65e5(\u91d1)NextWave Summit<\/a> [Japanese]<\/p>\n<ul>\n<li>When: January 23, 2015 2:30 PM - 7:30 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjU3MQ==\" target=\"_blank\">1\u670823\u65e5(\u91d1)\u88fd\u54c1\u4f53\u611f\uff7e\uff90\uff85\uff70<\/a> [Japanese]<\/p>\n<ul>\n<li>When: January 23, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Here is the top Palo Alto Networks news from this past week. &nbsp; Palo Alto Networks researchers analyze Anunak &amp; Chthonic malicious campaigns, and possible prevention using Traps, our Advanced Endpoint Protection &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203],"tags":[172,993,994,396,221],"coauthors":[716],"class_list":["post-7835","post","type-post","status-publish","format-standard","hentry","category-events","category-news-of-the-week","tag-android","tag-anunak","tag-chthonic","tag-ignite-2015","tag-ransomware"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7835","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=7835"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7835\/revisions"}],"predecessor-version":[{"id":11297,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7835\/revisions\/11297"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=7835"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=7835"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=7835"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=7835"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}