Tag Palo Alto Networks

CISA Warns of Ongoing Exploitation of Serious Vulnerability in Palo Alto Networks

On Thursday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) updated its Known Exploited Vulnerabilities (KEV) catalog with a recently patched critical vulnerability affecting Palo Alto Networks’ Expedition tool. CISA’s action follows evidence suggesting that the flaw is actively being exploited, posing significant risks to organizations relying on this software.…

Read MoreCISA Warns of Ongoing Exploitation of Serious Vulnerability in Palo Alto Networks

Palo Alto Integrates Agentic AI to Enhance Security Automation

Security Operations CEO Nikesh Arora: Next-Generation Security Play Integrates Automation and Identity in Cloud Environments Michael Novinson (MichaelNovinson) • October 28, 2025 Nikesh Arora, Chairman and CEO, Palo Alto Networks (Image: Palo Alto Networks) Palo Alto Networks is set to integrate intelligent agents throughout its security platform to enhance the…

Read MorePalo Alto Integrates Agentic AI to Enhance Security Automation

Microsoft Addresses 90 New Vulnerabilities, Including Actively Exploited NTLM and Task Scheduler Issues

On November 12, 2024, Microsoft disclosed that two significant security vulnerabilities affecting Windows NT LAN Manager (NTLM) and Task Scheduler have been actively exploited in the wild. These vulnerabilities were part of the November Patch Tuesday update, which addressed a total of 90 security flaws across Microsoft products. Among the…

Read MoreMicrosoft Addresses 90 New Vulnerabilities, Including Actively Exploited NTLM and Task Scheduler Issues

CISA Alerts on Two Actively Exploited Palo Alto Vulnerabilities; New RCE Attack Verified

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a warning on Thursday regarding the discovery of two vulnerabilities in the Palo Alto Networks Expedition software. These vulnerabilities are currently being exploited in the wild, heightening concerns for users and organizations that manage their network infrastructures with this tool. In…

Read MoreCISA Alerts on Two Actively Exploited Palo Alto Vulnerabilities; New RCE Attack Verified

PAN-OS Firewall Vulnerability Actively Exploited – Indicators of Compromise and Patch Available

Palo Alto Networks Identifies Zero-Day Exploit in PAN-OS Firewall Palo Alto Networks has recently unveiled crucial indicators of compromise (IoCs) following the confirmation of a zero-day vulnerability within its PAN-OS firewall management interface. This vulnerability has reportedly been targeted and actively exploited by threat actors in real-world scenarios. The company…

Read MorePAN-OS Firewall Vulnerability Actively Exploited – Indicators of Compromise and Patch Available

Salt Typhoon Strikes European Telecom Sector

Cyberwarfare / Nation-State Attacks, Fraud Management & Cybercrime Darktrace Reports on Compromise of Citrix NetScaler Gateway Akshaya Asokan (asokan_akshaya) • October 20, 2025 Image: Shutterstock Recent reports from the managed threat detection firm Darktrace indicate that a persistent campaign by the Chinese cyber espionage group known as Salt Typhoon continues…

Read MoreSalt Typhoon Strikes European Telecom Sector

Microsoft Addresses 72 Vulnerabilities, Including a Patch for Actively Exploited CLFS Issue

Microsoft Wraps Up 2024 Patch Tuesday with Critical Security Fixes Microsoft concluded its Patch Tuesday updates for December 2024, addressing a total of 72 security vulnerabilities across its software ecosystem, including a specific flaw reported as actively exploited in the wild. Of these vulnerabilities, 17 have been classified as Critical,…

Read MoreMicrosoft Addresses 72 Vulnerabilities, Including a Patch for Actively Exploited CLFS Issue

Vulnerability in Google Workspace May Allow Unauthorized Access for Attackers

Recent vulnerability findings have unveiled a significant design flaw within Google Workspace’s domain-wide delegation (DWD) feature. Cybersecurity researchers have reported that this flaw could enable malicious actors to escalate privileges and gain unauthorized access to Google Workspace APIs, bypassing super admin requirements. The analysis highlights the seriousness of this vulnerability,…

Read MoreVulnerability in Google Workspace May Allow Unauthorized Access for Attackers