Tag Palo Alto Networks
Palo Alto Networks Addresses Authentication Bypass Vulnerability in PAN-OS Software
Palo Alto Networks Addresses Severe Vulnerability in PAN-OS Palo Alto Networks has announced a critical update regarding a significant security vulnerability in its PAN-OS software, identified as CVE-2025-0108. This flaw poses a risk of authentication bypass, granting unauthorized network attackers the ability to leverage the management web interface without proper…
Newly Discovered Chinese Espionage Hacking Group Exposed
Cyberwarfare / Nation-State Attacks, Fraud Management & Cybercrime, Network Firewalls, Network Access Control ‘RedNovember’ Engages Organizations Across the US, Asia, and Europe Akshaya Asokan (asokan_akshaya) • September 25, 2025 Image: Shutterstock/ISMG A recently identified hacking group, linked to extensive compromises of edge devices, has been confirmed as state-aligned with China,…
CISA Includes Palo Alto Networks and SonicWall Vulnerabilities in Exploited Threats List
CISA Recognizes New Vulnerabilities Affecting Palo Alto Networks and SonicWall On Tuesday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) disclosed the addition of two vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, highlighting significant concerns regarding data security. These vulnerabilities impact the Palo Alto Networks PAN-OS and SonicWall SonicOS…
North Korean Hackers Unleash OtterCookie Malware in Widespread Interview Scheme
Recent cybersecurity revelations highlight the activities of North Korean threat actors, specifically within the context of the ongoing Contagious Interview campaign. This campaign has introduced a new JavaScript malware identified as OtterCookie, further escalating the threat landscape. Known as Contagious Interview (alternatively termed DeceptiveDevelopment), this persistent attack strategy employs social…
Stellantis Confirms Data Breach Impacting Customer Information
Data Breach at Stellantis Exposes Customer Information Stellantis, a prominent multinational automaker with brands like Chrysler, Jeep, and Fiat, has reported a data breach that implicates customer information following unauthorized access to a third-party service provider. This incident raises significant concerns regarding data security practices within the automotive industry and…
Webinar: Discover How ASPM Shifts Application Security from Reactive to Proactive
In today’s rapidly evolving cyber landscape, many organizations find themselves grappling with outdated security tools that fail to provide comprehensive protection. This common challenge leaves systems vulnerable to sophisticated threats, prompting a need for more effective strategies. To address these issues, Application Security Posture Management (ASPM) emerges as a promising…
⚡ THN Weekly Recap: Key Cybersecurity Threats, Tools, and Tips [February 10]
The current landscape of cybersecurity reveals that even the smallest vulnerabilities can precipitate significant breaches. Exposing an encryption key, neglecting a minor software update, or leaving a cloud storage bucket unsecured may seem trivial, yet these factors can become major gateways for cyber attacks. This week, instances of cybercriminals exploiting…
RA World Ransomware Attack in South Asia Tied to Chinese Espionage Toolkit
A recent ransomware incident attributed to the RA World group has highlighted a troubling intersection between cyber espionage and financial extortion. In November 2024, an unnamed software and services company in Asia became the target of a sophisticated attack employing a malicious toolset closely associated with Chinese cyber espionage tactics.…