Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Apple upgrades iPad Pro, MacBook Pro, Vision Pro with new M5 chip

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Scan activity in the Palo Alto Network Portal jumps 500% in one day
Identity

Scan activity in the Palo Alto Network Portal jumps 500% in one day

userBy userOctober 4, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 4, 2025Ravi LakshmananVulnerability/Network Security

Palo Alto Networks Portal

Threat Intelligence Firm Greynoise revealed on Friday that a surge in scansing activities targeting Palo Alto Networks Login Portals has been observed.

The company said it observed on October 3, 2025 that a nearly 500% increase in IP addresses scanning the Palo Alto Networks login portal was the highest recorded level in the last three months. It describes traffic as targeted and structured and aims primarily to the Palo Alto login portal.

As many as 1,300 unique IP addresses have participated in this effort, a major jump from around 200 unique IP addresses previously observed. Of these IP addresses, 93% are classified as suspicious and 7% are malicious.

The majority of IP addresses are immersed in the US and smaller clusters have been detected in the UK, Netherlands, Canada and Russia.

DFIR Retainer Service

“This Palo Alto Surge shares features with Cisco ASA scans that have occurred over the past 48 hours,” says Greynoise. “In both cases, the scanner showed overlapping regional clustering and fingerprints with the tools used.”

“The login scan traffic from both Cisco Asa and Palo Alto over the past 48 hours shares the dominant TLS fingerprint tied to Dutch infrastructure.”

In April 2025, Greynoise reported similar suspicious login scan activity targeting Palo Alto Networks Pan-OS Global-Protect Gateways, urging network security companies to urge customers to run the latest version of their software.

This development will often be followed by a surge in malicious scans, brute enhancements or exploit attempts, as Greynoise noted in its early warning signal report in July 2025, with disclosures of new CVEs affecting the same technology within six weeks.

In early September, Greynoise warned of a suspicious scan that occurred in late August, targeting Cisco Adaptive Security Appliance (ASA) devices. The first waves came from over 25,100 IP addresses, mainly in Argentina and Brazil, the United States.

CIS Build Kit

A few weeks later, Cisco disclosed two new zero-days in the CISCO ASA (CVE-2025-20333 and CVE-2025-20362) that were exploited in real-world attacks to deploy malware families such as Reynatiators and Line Vipers.

Shadowserver Foundation data shows that over 45,000 Cisco ASA/FTD instances have over 20,000 people in the US and approximately 14,000 people in Europe, making them susceptible to two vulnerabilities.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWith the latest acquisition, Openai doubles personalized consumer AI
Next Article Science News This Week: Famous primatologist Jane Goodall dies, Iran sinks at an incredible rate, scientists make human egg cells from the skin
user
  • Website

Related Posts

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

October 15, 2025

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

October 15, 2025

Over 100 VS Code extensions expose developers to hidden supply chain risks

October 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Apple upgrades iPad Pro, MacBook Pro, Vision Pro with new M5 chip

Group chats added to Threads as Messaging rolls out to the EU

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.