Tag Palo Alto Networks

HelloXD Ransomware Deploys Backdoor on Targeted Windows and Linux Systems

A new variant of ransomware known as HelloXD is actively targeting both Windows and Linux systems, alongside deploying a backdoor that allows attackers ongoing remote access to compromised machines. This underscores a concerning trend in ransomware threats, where operators are not only encrypting data but also setting up mechanisms for…

Read MoreHelloXD Ransomware Deploys Backdoor on Targeted Windows and Linux Systems

Researchers Caution Against Privilege Escalation Threats in Google’s Vertex AI ML Platform

Recent cybersecurity findings have revealed two significant vulnerabilities within Google’s Vertex AI machine learning platform. These exploits could be leveraged by malicious entities to escalate user privileges and exfiltrate sensitive models directly from the cloud environment. According to an analysis released by researchers from Palo Alto Networks Unit 42, exploiting…

Read MoreResearchers Caution Against Privilege Escalation Threats in Google’s Vertex AI ML Platform

Palo Alto Networks Addresses Authentication Bypass Vulnerability in PAN-OS Software

Palo Alto Networks Addresses Severe Vulnerability in PAN-OS Palo Alto Networks has announced a critical update regarding a significant security vulnerability in its PAN-OS software, identified as CVE-2025-0108. This flaw poses a risk of authentication bypass, granting unauthorized network attackers the ability to leverage the management web interface without proper…

Read MorePalo Alto Networks Addresses Authentication Bypass Vulnerability in PAN-OS Software

Newly Discovered Chinese Espionage Hacking Group Exposed

Cyberwarfare / Nation-State Attacks, Fraud Management & Cybercrime, Network Firewalls, Network Access Control ‘RedNovember’ Engages Organizations Across the US, Asia, and Europe Akshaya Asokan (asokan_akshaya) • September 25, 2025 Image: Shutterstock/ISMG A recently identified hacking group, linked to extensive compromises of edge devices, has been confirmed as state-aligned with China,…

Read MoreNewly Discovered Chinese Espionage Hacking Group Exposed

CISA Includes Palo Alto Networks and SonicWall Vulnerabilities in Exploited Threats List

CISA Recognizes New Vulnerabilities Affecting Palo Alto Networks and SonicWall On Tuesday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) disclosed the addition of two vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, highlighting significant concerns regarding data security. These vulnerabilities impact the Palo Alto Networks PAN-OS and SonicWall SonicOS…

Read MoreCISA Includes Palo Alto Networks and SonicWall Vulnerabilities in Exploited Threats List

North Korean Hackers Unleash OtterCookie Malware in Widespread Interview Scheme

Recent cybersecurity revelations highlight the activities of North Korean threat actors, specifically within the context of the ongoing Contagious Interview campaign. This campaign has introduced a new JavaScript malware identified as OtterCookie, further escalating the threat landscape. Known as Contagious Interview (alternatively termed DeceptiveDevelopment), this persistent attack strategy employs social…

Read MoreNorth Korean Hackers Unleash OtterCookie Malware in Widespread Interview Scheme

Stellantis Confirms Data Breach Impacting Customer Information

Data Breach at Stellantis Exposes Customer Information Stellantis, a prominent multinational automaker with brands like Chrysler, Jeep, and Fiat, has reported a data breach that implicates customer information following unauthorized access to a third-party service provider. This incident raises significant concerns regarding data security practices within the automotive industry and…

Read MoreStellantis Confirms Data Breach Impacting Customer Information

Webinar: Discover How ASPM Shifts Application Security from Reactive to Proactive

In today’s rapidly evolving cyber landscape, many organizations find themselves grappling with outdated security tools that fail to provide comprehensive protection. This common challenge leaves systems vulnerable to sophisticated threats, prompting a need for more effective strategies. To address these issues, Application Security Posture Management (ASPM) emerges as a promising…

Read MoreWebinar: Discover How ASPM Shifts Application Security from Reactive to Proactive