Tag Palo Alto Networks

Serious Vulnerabilities in Linux CUPS Printing System May Enable Remote Command Execution

A set of serious security vulnerabilities has emerged in the OpenPrinting Common Unix Printing System (CUPS), potentially allowing for remote command execution on Linux systems under specific circumstances. Security researcher Simone Margaritelli detailed that an unauthenticated remote attacker could exploit these vulnerabilities to alter or install printer IPP URLs, which…

Read MoreSerious Vulnerabilities in Linux CUPS Printing System May Enable Remote Command Execution

Microsoft Releases Security Update Addressing 118 Vulnerabilities, Including Two Under Active Exploitation

Microsoft has announced the release of security updates addressing 118 vulnerabilities in its software suite, two of which have been identified as actively exploited vulnerabilities in the wild. Among these vulnerabilities, three have been classified as Critical, while 113 are rated Important, and two are deemed Moderate. Notably, this Patch…

Read MoreMicrosoft Releases Security Update Addressing 118 Vulnerabilities, Including Two Under Active Exploitation

CISA Alerts About Major Fortinet Vulnerability as Palo Alto and Cisco Release Emergency Security Updates

On Wednesday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) announced the addition of a critical security vulnerability affecting Fortinet products to its Known Exploited Vulnerabilities (KEV) catalog. This action was taken in light of evidence indicating ongoing exploitation of this flaw. Identified as CVE-2024-23113, this vulnerability has a CVSS…

Read MoreCISA Alerts About Major Fortinet Vulnerability as Palo Alto and Cisco Release Emergency Security Updates

Exploitation of Critical Veeam Vulnerability Fuels Spread of Akira and Fog Ransomware

Recent cybersecurity reports indicate that threat actors are actively exploiting a critical security vulnerability in Veeam Backup & Replication software to deploy ransomware variants such as Akira and Fog. Sophos, a recognized cybersecurity vendor, has noted ongoing attacks that utilize compromised VPN credentials alongside the CVE-2024-40711 vulnerability to gain unauthorized…

Read MoreExploitation of Critical Veeam Vulnerability Fuels Spread of Akira and Fog Ransomware

Shutdown Delays Federal Response to F5 Hack

Cyberwarfare / Nation-State Attacks, Fraud Management & Cybercrime, Government Major Staffing Cuts and Furloughs Impede Federal Response to F5 Cyberattack Chris Riotta (@chrisriotta) • November 4, 2025 Image: Alexeenko Alexey/Shutterstock The U.S. government is grappling with the aftermath of a sophisticated cyber breach involving F5, an application security vendor, believed…

Read MoreShutdown Delays Federal Response to F5 Hack

Researchers Uncover ‘Deceptive Delight’ Technique for Bypassing AI Models

Cybersecurity Researchers Uncover New Jailbreak Technique for AI Models Recent findings by cybersecurity experts at Palo Alto Networks’ Unit 42 have revealed a novel adversarial approach known as “Deceptive Delight,” capable of bypassing the safety measures of large language models (LLMs) during interactive dialogues. By interspersing harmful instructions within benign…

Read MoreResearchers Uncover ‘Deceptive Delight’ Technique for Bypassing AI Models

Chinese Hackers Deploy PlugX Variant on Compromised Microsoft Exchange Servers

A sophisticated cyberespionage operation has emerged, directly attributed to a Chinese group utilizing vulnerabilities in Microsoft Exchange Servers unveiled earlier this March. This group, identified as PKPLUG (also known as Mustang Panda and HoneyMyte), has executed a new attack sequence deploying an undocumented variant of a remote access trojan, dubbed…

Read MoreChinese Hackers Deploy PlugX Variant on Compromised Microsoft Exchange Servers

The Airstalk Intrusion: A Covert Malware Targeting Corporate Supply Chains

The cybersecurity landscape is shaken by the emergence of a newly identified malware dubbed Airstalk, which researchers attribute to a suspected nation-state threat group. This malware employs enterprise management tools in unconventional ways, highlighting vulnerabilities in third-party ecosystems, particularly those supporting the global outsourcing sector. Its stealth and sophistication signal…

Read MoreThe Airstalk Intrusion: A Covert Malware Targeting Corporate Supply Chains