Tag Palo Alto Networks

Introducing ‘SockDetour’: A Fileless, Socketless Backdoor Targeting U.S. Defense Contractors

Title: New Malware ‘SockDetour’ Exposed as a Menace to U.S. Defense Contractors Recent research unveiled a sophisticated and previously unreported malware known as SockDetour, which has been targeting defense contractors in the United States. This stealthy backdoor is engineered to act as a secondary implant on compromised Windows systems, raising…

Read MoreIntroducing ‘SockDetour’: A Fileless, Socketless Backdoor Targeting U.S. Defense Contractors

Ukrainian Cryptojacking Kingpin Arrested at 29 for Exploiting Cloud Services

Ukrainian National Arrested for Sophisticated Cryptojacking Scheme A 29-year-old individual from Ukraine has been apprehended for orchestrating a comprehensive cryptojacking operation, which has reportedly yielded over $2 million (€1.8 million) in illicit earnings. Identified as the key architect behind the scheme, the suspect was arrested in Mykolaiv on January 9…

Read MoreUkrainian Cryptojacking Kingpin Arrested at 29 for Exploiting Cloud Services

Palo Alto Firewalls Vulnerable to Secure Boot Bypass and Firmware Exploits

A recent investigation into three firewall models produced by Palo Alto Networks has revealed notable security vulnerabilities. These flaws are related to both the firmware of the devices and improperly configured security settings. According to a report from security vendor Eclypsium shared with The Hacker News, these vulnerabilities are not…

Read MorePalo Alto Firewalls Vulnerable to Secure Boot Bypass and Firmware Exploits

How the $25 Billion Palo Alto Networks and CyberArk Deal Was Formed

Artificial Intelligence & Machine Learning, Cloud Security, Network Firewalls, Network Access Control An In-Depth Analysis of the 2nd Largest Cyber Acquisition Deal and Its Last-Minute Challenges Michael Novinson (MichaelNovinson) • September 30, 2025 The second-largest acquisition in the history of cybersecurity commenced with initial discussions in 2023. At one point,…

Read MoreHow the $25 Billion Palo Alto Networks and CyberArk Deal Was Formed

Chinese APT Phantom Taurus Targets MS Exchange Servers Over Three-Year Period

Researchers from Palo Alto Networks have uncovered a cyberespionage campaign linked to a group with ties to China, which has been actively targeting foreign ministries, embassies, and military communications through breaches of Microsoft Exchange email servers. Identified as Phantom Taurus, this group has been under surveillance for nearly three years.…

Read MoreChinese APT Phantom Taurus Targets MS Exchange Servers Over Three-Year Period

HelloXD Ransomware Deploys Backdoor on Targeted Windows and Linux Systems

A new variant of ransomware known as HelloXD is actively targeting both Windows and Linux systems, alongside deploying a backdoor that allows attackers ongoing remote access to compromised machines. This underscores a concerning trend in ransomware threats, where operators are not only encrypting data but also setting up mechanisms for…

Read MoreHelloXD Ransomware Deploys Backdoor on Targeted Windows and Linux Systems

Researchers Caution Against Privilege Escalation Threats in Google’s Vertex AI ML Platform

Recent cybersecurity findings have revealed two significant vulnerabilities within Google’s Vertex AI machine learning platform. These exploits could be leveraged by malicious entities to escalate user privileges and exfiltrate sensitive models directly from the cloud environment. According to an analysis released by researchers from Palo Alto Networks Unit 42, exploiting…

Read MoreResearchers Caution Against Privilege Escalation Threats in Google’s Vertex AI ML Platform

Palo Alto Networks Addresses Authentication Bypass Vulnerability in PAN-OS Software

Palo Alto Networks Addresses Severe Vulnerability in PAN-OS Palo Alto Networks has announced a critical update regarding a significant security vulnerability in its PAN-OS software, identified as CVE-2025-0108. This flaw poses a risk of authentication bypass, granting unauthorized network attackers the ability to leverage the management web interface without proper…

Read MorePalo Alto Networks Addresses Authentication Bypass Vulnerability in PAN-OS Software