    <meta property="twitter:title" content="2017 Black Hat Europe NOC: Tales of Coverage and Compromise" />
    <meta property="twitter:description" content="In this blog post, we’ll provide an overview on how the Palo Alto Networks NGFW was utilized for the Black Hat Europe event and also discuss our findings of the types of malware that were trending this holiday season." />
{"version":"1.0","provider_name":"Palo Alto Networks Blog","provider_url":"https:\/\/www.paloaltonetworks.ca\/blog","author_name":"Dan Ward","author_url":"https:\/\/www.paloaltonetworks.ca\/blog\/author\/dan-ward\/","title":"2017 Black Hat Europe NOC: Tales of Coverage and Compromise","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"fjDdV2i0rD\"><a href=\"https:\/\/www.paloaltonetworks.ca\/blog\/2018\/01\/2017-black-hat-europe-noc-tales-coverage-compromise\/\">2017 Black Hat Europe NOC: Tales of Coverage and Compromise<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.paloaltonetworks.ca\/blog\/2018\/01\/2017-black-hat-europe-noc-tales-coverage-compromise\/embed\/#?secret=fjDdV2i0rD\" width=\"600\" height=\"338\" title=\"&#8220;2017 Black Hat Europe NOC: Tales of Coverage and Compromise&#8221; &#8212; Palo Alto Networks Blog\" data-secret=\"fjDdV2i0rD\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.paloaltonetworks.ca\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/01\/Blackhat_1.png","thumbnail_width":739,"thumbnail_height":348,"description":"In this blog post, we\u2019ll provide an overview on how the Palo Alto Networks NGFW was utilized for the Black Hat Europe event and also discuss our findings of the types of malware that were trending this holiday season."}