Tag Palo Alto Networks

Microsoft Addresses 90 New Vulnerabilities, Including Actively Exploited NTLM and Task Scheduler Issues

On November 12, 2024, Microsoft disclosed that two significant security vulnerabilities affecting Windows NT LAN Manager (NTLM) and Task Scheduler have been actively exploited in the wild. These vulnerabilities were part of the November Patch Tuesday update, which addressed a total of 90 security flaws across Microsoft products. Among the…

Read MoreMicrosoft Addresses 90 New Vulnerabilities, Including Actively Exploited NTLM and Task Scheduler Issues

CISA Alerts on Two Actively Exploited Palo Alto Vulnerabilities; New RCE Attack Verified

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a warning on Thursday regarding the discovery of two vulnerabilities in the Palo Alto Networks Expedition software. These vulnerabilities are currently being exploited in the wild, heightening concerns for users and organizations that manage their network infrastructures with this tool. In…

Read MoreCISA Alerts on Two Actively Exploited Palo Alto Vulnerabilities; New RCE Attack Verified

PAN-OS Firewall Vulnerability Actively Exploited – Indicators of Compromise and Patch Available

Palo Alto Networks Identifies Zero-Day Exploit in PAN-OS Firewall Palo Alto Networks has recently unveiled crucial indicators of compromise (IoCs) following the confirmation of a zero-day vulnerability within its PAN-OS firewall management interface. This vulnerability has reportedly been targeted and actively exploited by threat actors in real-world scenarios. The company…

Read MorePAN-OS Firewall Vulnerability Actively Exploited – Indicators of Compromise and Patch Available

Salt Typhoon Strikes European Telecom Sector

Cyberwarfare / Nation-State Attacks, Fraud Management & Cybercrime Darktrace Reports on Compromise of Citrix NetScaler Gateway Akshaya Asokan (asokan_akshaya) • October 20, 2025 Image: Shutterstock Recent reports from the managed threat detection firm Darktrace indicate that a persistent campaign by the Chinese cyber espionage group known as Salt Typhoon continues…

Read MoreSalt Typhoon Strikes European Telecom Sector

Microsoft Addresses 72 Vulnerabilities, Including a Patch for Actively Exploited CLFS Issue

Microsoft Wraps Up 2024 Patch Tuesday with Critical Security Fixes Microsoft concluded its Patch Tuesday updates for December 2024, addressing a total of 72 security vulnerabilities across its software ecosystem, including a specific flaw reported as actively exploited in the wild. Of these vulnerabilities, 17 have been classified as Critical,…

Read MoreMicrosoft Addresses 72 Vulnerabilities, Including a Patch for Actively Exploited CLFS Issue

Vulnerability in Google Workspace May Allow Unauthorized Access for Attackers

Recent vulnerability findings have unveiled a significant design flaw within Google Workspace’s domain-wide delegation (DWD) feature. Cybersecurity researchers have reported that this flaw could enable malicious actors to escalate privileges and gain unauthorized access to Google Workspace APIs, bypassing super admin requirements. The analysis highlights the seriousness of this vulnerability,…

Read MoreVulnerability in Google Workspace May Allow Unauthorized Access for Attackers

Interpol Arrests 11 Members of Nigerian BEC Cybercrime Syndicate

A recent coordinated operation by law enforcement officials has led to the apprehension of 11 alleged members of a Nigerian cybercrime syndicate involved in numerous business email compromise (BEC) attacks. This group’s activities have reportedly targeted over 50,000 victims globally in recent years. The crackdown, termed Operation Falcon II, stemmed…

Read MoreInterpol Arrests 11 Members of Nigerian BEC Cybercrime Syndicate

Misconfigured Kubernetes RBAC in Azure Airflow May Leave Entire Cluster Vulnerable to Exploitation

Security Flaws Discovered in Microsoft Azure Data Factory’s Apache Airflow Integration Cybersecurity experts have identified three significant vulnerabilities within Microsoft’s Azure Data Factory integration of Apache Airflow. These weaknesses, if exploited, could allow attackers to engage in a range of covert activities, including unauthorized data extraction and the deployment of…

Read MoreMisconfigured Kubernetes RBAC in Azure Airflow May Leave Entire Cluster Vulnerable to Exploitation