Security News

Fake Palo Alto GlobalProtect used as lure to backdoor enterprises
2024-08-29 18:29

Threat actors target Middle Eastern organizations with malware disguised as the legitimate Palo Alto GlobalProtect Tool that can steal data and execute remote PowerShell commands to infiltrate...

Iran's Pioneer Kitten hits US networks via buggy Check Point, Palo Alto gear
2024-08-28 18:00

The government-backed crew also enjoys ransomware as a side hustle Iranian government-backed cybercriminals have been hacking into US and foreign networks as recently as this month to steal...

Palo Alto Networks execs apologize for 'hostesses' dressed as lamps at Black Hat booth
2024-08-14 14:00

Company admits turning human women into faceless, sexualized furniture was a 'tone deaf' marketing ploy If you attended the Black Hat conference in Vegas last week and found yourself over in Palo...

Palo Alto Networks Patches Critical Flaw in Expedition Migration Tool
2024-07-11 15:19

Palo Alto Networks has released security updates to address five security flaws impacting its products, including a critical bug that could lead to an authentication bypass. Cataloged as CVE-2024-5910, the vulnerability has been described as a case of missing authentication in its Expedition migration tool that could lead to an admin account takeover.

Check Point vs Palo Alto (2024): Which NGFW Is Better?
2024-06-27 13:00

For large organizations looking for next-generation firewall solutions, Check Point and Palo Alto Networks are two of the top providers today. In CyberRatings's 2024 Cloud Network Firewall test, Check Point and Palo Alto Networks NGFWs were marked as "Recommended" solutions for their security effectiveness.

Fortinet vs Palo Alto (2024): Which NGFW Is Best for Your Team?
2024-06-26 12:00

As two top NGFWs, Fortinet FortiGate seems to best fit small businesses, while Palo Alto works best for larger organizations. Find out in our comparison below.

RedTail Crypto-Mining Malware Exploiting Palo Alto Networks Firewall Vulnerability
2024-05-30 14:24

The threat actors behind the RedTail cryptocurrency mining malware have added a recently disclosed security flaw impacting Palo Alto Networks firewalls to its exploit arsenal. The addition of the...

SentinelOne vs Palo Alto: Compare EDR software
2024-05-27 13:00

SentinelOne and Palo Alto are two of the top brands in this space, and this comparison will help you decide if either one of the company's tools is right for you. While you can request a demo of Cortex XDR on Palo Alto's official website, there is no explicit price list of both Cortex XDR tiers as of May 2024.

Week in review: PoCs allow persistence on Palo Alto firewalls, Okta credential stuffing attacks
2024-05-05 08:00

Palo Alto firewalls: CVE-2024-3400 exploitation and PoCs for persistence after resets/upgradesThere are proof-of-concept techniques allowing attackers to achieve persistence on Palo Alto Networks firewalls after CVE-2024-3400 has been exploited, the company has confirmed on Monday, but they are "Not aware at this time of any malicious attempts to use these persistence techniques in active exploitation of the vulnerability." Okta warns customers about credential stuffing onslaughtCredential stuffing attacks have exploded this April, Okta warns, and advises its customers to use available tools to block access requests originating from residential proxies before authentication takes place.

Palo Alto firewalls: CVE-2024-3400 exploitation and PoCs for persistence after resets/upgrades
2024-04-30 12:44

There are proof-of-concept techniques allowing attackers to achieve persistence on Palo Alto Networks firewalls after CVE-2024-3400 has been exploited, the company has confirmed on Monday, but they are "Not aware at this time of any malicious attempts to use these persistence techniques in active exploitation of the vulnerability." On April 12, Palo Alto Networks warned about limited attacks against internet-exposed firewalls, likely by a state-backed threat actor, who managed to install backdoors, grab sensitive data, and move laterally through target organizations' networks.