Log4j is a serious issue we have today. Probably one of the most serious vulnerabilities of my time. It’s so...
HOW TLS WORKS TLS version negotiation is typically performed as part of the SSL/TLS handshake process. When a client initiates...
HOW CERTIFICATE CHAINS WORK Certificate chains, also known as a chain of trust, work on the concept of Public Key...
This site is good for testing thinks like TLS versions and Untrusted Root. https://badssl.com/ https://untrusted-root.badssl.com https://tls-v1-0.badssl.com/ https://tls-v1-1.badssl.com/ https://tls-v1-2.badssl.com/...
Palo Alto Networks firewalls provide URL filtering capabilities, which you can use to control access to websites by blocking or...
1. Update your frontline defenses Adhere to policies and best practices for application, system, and appliance security. Create unique passwords...
-Maintain up-to-date antivirus signatures and engines. -Keep operating system patches up-to-date. -Disable File and Printer sharing services. If these services...
From Palo Alto’s Website: Environment All PAN-OS Anti-Virus license Resolution What is Ransomware? Ransomware is a family of malware...
UPDATE: In Panorama PAN-OS 10.X: You cannot use the ‘equal-to‘ operator for custom signatures in this use case. The ‘negate‘...