Red Education(@red_education) 's Twitter Profile Photo

'I came back because I have complete trust in the trainer's expertise and experience to provide exceptional training...' - Verified Student Review, Palo Alto Networks EDU-330 training

account_circle
مالك الدوسري/Malek Aldossary(@MAlajab) 's Twitter Profile Photo

تفاصيل جديدة ومزيد من موشرات الاختراق لثغرة CVE-2024-3400 الخاصة بمنتجات paloaltonetworks
من هنا: paloaltonetworks.com/blog/2024/04/m…

تفاصيل جديدة ومزيد من موشرات الاختراق لثغرة CVE-2024-3400 الخاصة بمنتجات paloaltonetworks
من هنا: paloaltonetworks.com/blog/2024/04/m…
#الامن_السيبراني
account_circle
Bipin Jitiya(@win3zz) 's Twitter Profile Photo

CVE-2024-3400: OS Command Injection Vulnerability in GlobalProtect Gateway

Severity: CRITICAL (10/10) ⚠️

Poc: github.com/DrewskyDev/CVE…

Other info:
unit42.paloaltonetworks.com/cve-2024-3400/
volexity.com/blog/2024/04/1…

CVE-2024-3400: OS Command Injection Vulnerability in GlobalProtect Gateway

Severity: CRITICAL (10/10) ⚠️

Poc: github.com/DrewskyDev/CVE…

Other info: 
unit42.paloaltonetworks.com/cve-2024-3400/
volexity.com/blog/2024/04/1…
account_circle
0xor0ne(@0xor0ne) 's Twitter Profile Photo

Excellent writeup on CVE-2019-5736: vulnerability in runC (Docker) that allow to gain root privileges
(credits Yuval Avrahami)

unit42.paloaltonetworks.com/breaking-docke…

Excellent writeup on CVE-2019-5736: vulnerability in runC (Docker) that allow to gain root privileges
(credits Yuval Avrahami)

unit42.paloaltonetworks.com/breaking-docke…

#docker #cybersecurity
account_circle
Justin Elze(@HackingLZ) 's Twitter Profile Photo

'How to Remedy CVE-2024-3400' An improvement over other vendors they're not suggesting lighting them on fire.

knowledgebase.paloaltonetworks.com/KCSArticleDeta…

'How to Remedy CVE-2024-3400' An improvement over other vendors they're not suggesting lighting them on fire.

knowledgebase.paloaltonetworks.com/KCSArticleDeta…
account_circle
Will Dormann(@wdormann) 's Twitter Profile Photo

Your usual reminder that 'let's run things as root because it's easier' is *not* limited only to discount routers you get from the big-box store.
Palo Alto CVE-2024-3400 security.paloaltonetworks.com/CVE-2024-3400

Your usual reminder that 'let's run things as root because it's easier' is *not* limited only to discount routers you get from the big-box store.
Palo Alto CVE-2024-3400 security.paloaltonetworks.com/CVE-2024-3400
account_circle
Tay 💖(@tayvano_) 's Twitter Profile Photo

fyi you don't just have to be scared of hiring dprk, you have to be scared of them 'hiring' you 😘

unit42.paloaltonetworks.com/two-campaigns-…

fyi you don't just have to be scared of hiring dprk, you have to be scared of them 'hiring' you 😘

unit42.paloaltonetworks.com/two-campaigns-…
account_circle
Red Education(@red_education) 's Twitter Profile Photo

In this new case study, read how worked together to improve skills across the ecosystem, lifting the levels of knowledge, skill and experience with Palo Alto Networks solutions and improving customer experience bit.ly/casestuds

account_circle
Unit 42(@Unit42_Intel) 's Twitter Profile Photo

2024-03-19 (Tuesday): infection from malicious Excel file. Since last week, DarkGate started using AutoHotkey script instead of AutoIt script for its infection. Indicators from an infection available at bit.ly/3vu8vfr

2024-03-19 (Tuesday): #DarkGate infection from malicious Excel file. Since last week, DarkGate started using AutoHotkey script instead of AutoIt script for its infection. Indicators from an infection available at bit.ly/3vu8vfr

#Unit42ThreatIntel #TimelyThreatIntel
account_circle
徳丸 浩(@ockeghem) 's Twitter Profile Photo

違う!>『最近のブラウザであれば、このCSRFからの脅威を緩和するために「同一オリジンポリシー」をとっています』他も色々雑な記事 / “DNSリバインディング攻撃: 悪意のあるWebサイトがプライベートネットワークを悪用する方法” htn.to/DVgaVY7GM6

account_circle
Palo Alto Networks(@PaloAltoNtwks) 's Twitter Profile Photo

Can’t stop, won’t stop...innovating.

The proof? We’ve been named a Leader in the 2024 Gartner® Magic Quadrant™ for Security Service Edge.

Read the report to see how we've been recognized for our ability to execute and completeness of vision. bit.ly/4bddS1U

Can’t stop, won’t stop...innovating.

The proof? We’ve been named a Leader in the 2024 Gartner® Magic Quadrant™ for Security Service Edge.

Read the report to see how we've been recognized for our ability to execute and completeness of vision. bit.ly/4bddS1U
account_circle
Unit 42(@Unit42_Intel) 's Twitter Profile Photo

2024-03-27 (Wednesday): With the recent rise in malicious Google ads impersonating legitimate software, today we found one leading to a fake Cisco AnyConnect page pushing . Indicators available at bit.ly/49mdPzG

2024-03-27 (Wednesday): With the recent rise in malicious Google ads impersonating legitimate software, today we found one leading to a fake Cisco AnyConnect page pushing #NetSupportRAT. Indicators available at bit.ly/49mdPzG

#Unit42ThreatIntel #RemoteAccessTrojan
account_circle
Unit 42(@Unit42_Intel) 's Twitter Profile Photo

2024-04-04 (Thursday): We generated an infection in a lab environment based on the latest round of / activity. Initial bank-themed lures started earlier this week on 2024-04-02. Some indicators available at bit.ly/3PQut3r

2024-04-04 (Thursday): We generated an infection in a lab environment based on the latest round of #KoiLoader/#KoiStealer activity. Initial bank-themed lures started earlier this week on 2024-04-02. Some indicators available at bit.ly/3PQut3r

#Unit42ThreatIntel
account_circle
Unit 42 Japan(@unit42_jp) 's Twitter Profile Photo

現在の攻撃スコープを改訂し脆弱性エクスプロイト試行レベルをレベル1〜3で評価しました。Operation MidnightEclipseから判明したアクティビティ詳細をUPSTYLEおよびCronjobバックドアのアクティビティで大幅改訂しました。 bit.ly/3JlnGLp

現在の攻撃スコープを改訂し脆弱性エクスプロイト試行レベルをレベル1〜3で評価しました。Operation MidnightEclipseから判明したアクティビティ詳細をUPSTYLEおよびCronjobバックドアのアクティビティで大幅改訂しました。 bit.ly/3JlnGLp #CVE2024300
account_circle