Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

ChatGPT advertises | Tech Crunch

So what’s going on with the music board?

China-linked UNC3886 targets Singapore’s telecom sector with cyber espionage

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Scan activity in the Palo Alto Network Portal jumps 500% in one day
Identity

Scan activity in the Palo Alto Network Portal jumps 500% in one day

userBy userOctober 4, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 4, 2025Ravi LakshmananVulnerability/Network Security

Palo Alto Networks Portal

Threat Intelligence Firm Greynoise revealed on Friday that a surge in scansing activities targeting Palo Alto Networks Login Portals has been observed.

The company said it observed on October 3, 2025 that a nearly 500% increase in IP addresses scanning the Palo Alto Networks login portal was the highest recorded level in the last three months. It describes traffic as targeted and structured and aims primarily to the Palo Alto login portal.

As many as 1,300 unique IP addresses have participated in this effort, a major jump from around 200 unique IP addresses previously observed. Of these IP addresses, 93% are classified as suspicious and 7% are malicious.

The majority of IP addresses are immersed in the US and smaller clusters have been detected in the UK, Netherlands, Canada and Russia.

DFIR Retainer Service

“This Palo Alto Surge shares features with Cisco ASA scans that have occurred over the past 48 hours,” says Greynoise. “In both cases, the scanner showed overlapping regional clustering and fingerprints with the tools used.”

“The login scan traffic from both Cisco Asa and Palo Alto over the past 48 hours shares the dominant TLS fingerprint tied to Dutch infrastructure.”

In April 2025, Greynoise reported similar suspicious login scan activity targeting Palo Alto Networks Pan-OS Global-Protect Gateways, urging network security companies to urge customers to run the latest version of their software.

This development will often be followed by a surge in malicious scans, brute enhancements or exploit attempts, as Greynoise noted in its early warning signal report in July 2025, with disclosures of new CVEs affecting the same technology within six weeks.

In early September, Greynoise warned of a suspicious scan that occurred in late August, targeting Cisco Adaptive Security Appliance (ASA) devices. The first waves came from over 25,100 IP addresses, mainly in Argentina and Brazil, the United States.

CIS Build Kit

A few weeks later, Cisco disclosed two new zero-days in the CISCO ASA (CVE-2025-20333 and CVE-2025-20362) that were exploited in real-world attacks to deploy malware families such as Reynatiators and Line Vipers.

Shadowserver Foundation data shows that over 45,000 Cisco ASA/FTD instances have over 20,000 people in the US and approximately 14,000 people in Europe, making them susceptible to two vulnerabilities.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWith the latest acquisition, Openai doubles personalized consumer AI
Next Article Science News This Week: Famous primatologist Jane Goodall dies, Iran sinks at an incredible rate, scientists make human egg cells from the skin
user
  • Website

Related Posts

China-linked UNC3886 targets Singapore’s telecom sector with cyber espionage

February 9, 2026

SolarWinds Web Help Desk exploited by RCE in multi-stage attack against public servers

February 9, 2026

AI Skill Malware, 31Tbps DDoS, Notepad++ Hack, LLM Backdoors and More

February 9, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

ChatGPT advertises | Tech Crunch

So what’s going on with the music board?

China-linked UNC3886 targets Singapore’s telecom sector with cyber espionage

Now you can let people know you’ve arrived at your destination on Snapchat

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.