Remove tag threat-hunting
article thumbnail

How to Start Threat Hunting

Palo Alto Networks

We’ve just wrapped up our first ever Inside the Hunt Virtual Threat Hunting Summit and were blown away by the fantastic engagement from everyone who attended ( here’s the replay if you missed it). Of the many great questions submitted by the audience, one stood out most prominently: “How do I start threat hunting?”.

How To 95
article thumbnail

Palo Alto Networks Secures Black Hat from Itself

Palo Alto Networks

The network and security operations center (NOC/SOC) at the Black Hat USA Conference serves the critical role of ensuring that the conference's entire network is running smoothly and efficiently, as well as detecting and responding to any security threats. Cortex XDR provides visibility and reporting for threat hunters and NOC guests.

Network 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Busted by Cortex XDR: a True Story of Human Intuition and AI

Palo Alto Networks

On March 17, our webinar “ Leverage Your Firewall to Expose Attackers Hiding in Your Network ” webinar will share tips on using Cortex XDR to discover network threats. These analysts are called Unit 42: the global threat intelligence team at Palo Alto Networks that is renowned for their work to hunt, catch and tag threats.

article thumbnail

How Watchdog smuggles malware into your network as uninteresting photos

Lacework

This blog takes a look at the latter technique in recent cryptojacking activity from a group known as WatchDog. General indicators and signatures for steg malware are provided in the hunting section. Previous blogs about Watchdog attacks report targeting of Chinese network ranges. Steg Hunting & General Trends.

Malware 96
article thumbnail

Cortex XDR Further Extends Network Visibility and Endpoint Control

Palo Alto Networks

Threat hunting and response across data sources just got a little easier. Cortex XDR application and agent releases in March and April introduce an amazing array of new features to help your security team identify threats in network traffic, orchestrate response at scale and reduce the attack surface of their endpoints. .

Network 53
article thumbnail

9 Free Tools to Automate Your Incident Response Process

Altexsoft

These measures can include monitoring, implementation of access controls, behavior analysis, and incorporation of threat intelligence. Wazuh is a solution for compliance, integrity monitoring, threat detection, and incident response. You can integrate it with a variety of threat intelligence sources. Includes compliance mapping.

Tools 109
article thumbnail

Measurement: What SaaS platform builders need to know to prepare for growth, Part 3

CloudGeometry

In this blog series, we explore how these three dimensions figure into key technical recommendations which enable scale in pursuit of SaaS business growth. use this in forensics or in capacity analysis Log data can be used to prevent, detect, and respond to threats, breaches, endpoint hacks, threat hunting, cloud capacity management, etc.

Metrics 130