Last month, Volexity reported on its discovery of zero-day, in-the-wild exploitation of CVE-2024-3400 in the GlobalProtect feature of Palo Alto Networks PAN-OS by a threat actor Volexity tracks as UTA0218. Volexity has conducted several additional incident response investigations and proactive analyses of Palo Alto Networks firewall devices since the initial two cases described in Volexity’s blog post. Volexity believes with moderate confidence that UTA0218 is a China-based threat actor bas...| Volexity
A major success marker of great security leaders and their teams is one simple prioritization technique: the ability to know what needs to be done really well vs. what needs to be simply ok. In other words knowing when to go for an "A-grade" vs. when to simply "Pass", and making sure that the A-grade goals are dominated by what gives you the most leverage not just the things that are evidently critical. It has been over 4 years since I wrote the first version of this post. Since then, these...| Risk and Cyber
For over 15 years, YARA has been growing and evolving until it became an indispensable tool in every malware researcher’s toolbox.| YARA-X
Can someone call John Wick, or Ja Rule? I NEED HELP| www.detectionengineering.net
Can we do some input sanitization now?| www.detectionengineering.net