Tag: firewall
-
Product showcase: NetGuard open-source firewall for Android
NetGuard is a free, open-source firewall for Android phones and tablets that provides users with a simple way to block internet access. Android does not allow VPN services to … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/05/08/product-showcase-netguard-open-source-firewall-android/
-
Nation-state actors exploit Palo Alto PAN-OS zero-day for weeks
Palo Alto says hackers exploited PAN-OS zero-day CVE-2026-0300 for weeks, gaining root access to exposed firewalls and hiding traces. Palo Alto Networks warned that suspected state-sponsored hackers have been exploiting the critical PAN-OS zero-day CVE-2026-0300 for nearly a month. After exploiting the flaw, attackers deployed tunneling tools such as EarthWorm and ReverseSocks5, used stolen credentials…
-
State-sponsored hackers likely behind zero-day attacks on Palo Alto firewalls
Palo Alto Networks believes the in-the-wild exploitation of a zero-day vulnerability (CVE-2026-0300) in its firewalls is likely the work of state-sponsored threat actors. A … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/05/07/state-sponsored-hackers-zero-day-attacks-palo-alto-firewalls/
-
Critical Palo Alto Networks software bug hits exposed firewalls
Tags: access, attack, authentication, data-breach, firewall, mitigation, network, software, threat, updateMitigations first, patches shortly after: While Palo Alto Networks has announced fixes for affected PAN-OS branches, the company is urging customers to immediately reduce exposure rather than wait for patch windows. The vendor said the most important mitigation is restricting access to the User-Id Authentication Portal so it is reachable only from trusted internal IP…
-
Palo Alto Networks firewall zero-day exploited for nearly a month
Palo Alto Networks warned customers that suspected state-sponsored hackers have been exploiting a critical-severity PAN-OS firewall zero-day vulnerability for nearly a month. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/pan-os-firewall-rce-zero-day-exploited-in-attacks-since-april-9/
-
PAN-OS: Aktiv ausgenutzte Firewall-Lücke wird erst in einer Woche gepatcht
Angreifer kapern durch speziell gestaltete Datenpakete ganze Firewalls von Palo Alto Networks. Einen Patch dagegen gibt es frühestens ab dem 13. Mai. First seen on golem.de Jump to article: www.golem.de/news/palo-alto-networks-hacker-attackieren-firewalls-ueber-zero-day-luecke-2605-208405.html
-
Palo Alto Networks: Hacker attackieren Firewalls über Zero-Day-Lücke
Angreifer kapern durch speziell gestaltete Datenpakete ganze Firewalls von Palo Alto Networks. Einen Patch dagegen gibt es frühestens ab dem 13. Mai. First seen on golem.de Jump to article: www.golem.de/news/palo-alto-networks-hacker-attackieren-firewalls-ueber-zero-day-luecke-2605-208405.html
-
Palo Alto warns of critical software bug used in firewall attacks
A patch for the bug, tracked as CVE-2026-0300, has not been published yet and Palo Alto Networks said it will be included in releases over the next two weeks. First seen on therecord.media Jump to article: therecord.media/palo-alto-warns-of-critical-software-bug-firewalls
-
Palo Alto Firewalls Being Exploited; No Patch Yet Available
Vendor Details Mitigations, Promises Patched PAN-OS Software in Coming Weeks. Palo Alto Networks warned that a critical vulnerability in the PAN-OS software that runs its firewalls is being actively exploited in the wild by attackers. The vendor detailed temporary mitigations and promised to release updated software to fully patch the flaw later this month. First…
-
Palo Alto Networks Firewall Zero-Day Exploited in Active Attacks
Palo Alto Networks disclosed a critical PAN-OS firewall vulnerability that is being actively exploited. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/palo-alto-networks-firewall-zero-day-exploited-in-active-attacks/
-
When the Breach Gets In Through the CEO’s Inbox, Not the Firewall
Tags: authentication, breach, ceo, detection, endpoint, firewall, framework, mfa, vulnerability, zero-trustSecurity teams have put in a lot of effort in the last decade to make sure that security parameters are as robust as possible. Because of this, zero trust frameworks, multi-factor authentication, endpoint detection, patched vulnerabilities have become baseline requirements for security. The technical stack for security has never been more sophisticated. And yet, breaches…
-
CyberSoftware Schutz in Schichten denken
Mehrstufige Sicherheit als Unternehmensstrategie Die Infografik »Cyber Security Software« zeigt, dass IT”‘Sicherheit heute aus einem mehrschichtigen System besteht. Kein einzelnes Tool kann alle Risiken abdecken entscheidend ist das Zusammenspiel spezialisierter Lösungen entlang der gesamten IT”‘Infrastruktur. Prävention und Zugriffsschutz Firewalls, Antivirensoftware und Endpoint”‘Protection bilden die erste Verteidigungslinie. Sie verhindern, dass Schadsoftware oder unautorisierte Zugriffe überhaupt… First…
-
PAN-OS Flaw CVE-2026-0300 Exposes Firewalls to Remote Code Execution
A newly disclosed cybersecurity issue, tracked as CVE-2026-0300, has drawn urgent attention due to its critical severity and active exploitation. The flaw affects PAN-OS, the operating system used in Palo Alto Networks firewalls, and has been categorized as a buffer overflow vulnerability with serious implications for enterprise security environments. First seen on thecyberexpress.com Jump to…
-
Root-level RCE vulnerability in Palo Alto firewalls exploited (CVE-2026-0300)
A critical vulnerability (CVE-2026-0300) affecting Palo Alto Networks firewalls is being actively exploited by attackers, the security company acknowledged today, and urged … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/05/06/palo-alto-firewalls-vulnerability-exploited-cve-2026-0300/
-
Palo Alto Networks warns of firewall RCE zero-day exploited in attacks
Tags: attack, authentication, exploit, firewall, network, rce, remote-code-execution, vulnerability, zero-dayPalo Alto Networks warned customers today that a critical-severity unpatched vulnerability in the PAN-OS User-ID Authentication Portal is being exploited in attacks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/palo-alto-networks-warns-of-actively-exploited-firewall-zero-day/
-
Critical Palo Alto Firewall Vulnerability Enables Attackers to Gain Root Privileges
Palo Alto Networks has issued an urgent security advisory concerning a critical vulnerability affecting its PAN-OS software. Tracked as CVE-2026-0300, this high-severity security flaw carries a CVSS 4.0 base score of 9.3 and is currently experiencing limited active exploitation in the wild. The vulnerability allows unauthenticated, remote attackers to execute arbitrary code with full root…
-
Response-ready Cybersecurity Reaktionsbereit statt nur geschützt
Cybersecurity war lange Zeit vor allem eines: Prävention. Firewalls, Endpoint-Protection, E-Mail-Filter, Multi-Faktor-Authentifizierung die Strategie lautete, Angriffe möglichst früh zu stoppen, bevor sie Schaden anrichten. Das bleibt wichtig. Doch in der heutigen Bedrohungslage reicht dieser Ansatz allein nicht mehr aus. Die unbequeme Wahrheit lautet: Kein Schutzschild ist lückenlos. Und genau deshalb verschiebt sich der Fokus […]…
-
Pipelock: Open-source AI agent firewall
AI coding agents run with shell access, environment variables containing API keys, and unrestricted internet connectivity, creating a single point of failure where one … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/05/04/pipelock-open-source-ai-agent-firewall/
-
Windows shell spoofing vulnerability puts sensitive data at risk
A difficult balance: Erik Avakian, technical counselor at Info-Tech Research Group, noted that when it set the patching deadline, CISA had been operating within the guidelines laid down in Binding Operational Directive (BOD) 22-01, which requires US federal agencies to patch vulnerabilities within the timelines outlined under the policy, which range from 14 to 21…
-
Dismantle implicit trust in OT networks, CISA tells critical infrastructure operators
Tags: access, ai, cisa, communications, control, data-breach, detection, firewall, guide, infrastructure, network, open-source, siem, tactics, tool, vpn, zero-trustWhat it means for security teams: The publication closes a gap that CISA’s Zero Trust Maturity Model 2.0 acknowledged, having stated it did not address challenges specific to operational technology. It follows February’s Barriers to Secure OT Communications and earlier CISA warnings that exposed VPNs, firewalls, and legacy edge devices remain the dominant entry points…
-
SonicWall SonicOS Flaw Lets Attackers Bypass Access Controls and Crash Firewalls
SonicWall has released a security advisory detailing three new vulnerabilities affecting its SonicOS software. Disclosed on April 29, 2026, under advisory ID SNWLID-2026-0004, these security flaws open the door for attackers to bypass access controls, manipulate restricted files, and intentionally crash critical firewall infrastructure. The most severe of the three bugs carries a high-severity score,…
-
The Breach Did Not Knock on the Front Door
Attackers are getting in. Security teams have long accepted that premise. What is unsettling is where they are entering from. They are coming through software packages that development teams trust by default, hijacking single sign-on accounts that serve as master keys to dozens of business applications, and pulling firewall configuration files that reveal how a……
-
Open-source IPFire DNS Firewall blocks malware and phishing at the resolver
The IPFire project shipped Core Update 201 for its 2.29 release line, bringing DNS-layer domain blocking into the open-source firewall distribution. The update replaces two … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/28/open-source-ipfire-dns-firewall/
-
Open-source IPFire DNS Firewall blocks malware and phishing at the resolver
The IPFire project shipped Core Update 201 for its 2.29 release line, bringing DNS-layer domain blocking into the open-source firewall distribution. The update replaces two … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/28/open-source-ipfire-dns-firewall/
-
DDoS Testing vs Protection: The Missing Layer in Your Defense
Key takeaways DDoS protection refers to the tools and architecture deployed to stop attacks (CDNs, WAFs, scrubbing centers, firewall rules) operating continuously in the traffic path DDoS testing is a controlled simulation that validates whether those tools actually work under real-world attack conditions 68% of protection faults found in Red Button simulations were rated… First…
-
Cybersec is a thankless job: expanding workload and shrinking pay packet
Global recruitment giant says 71% of human firewalls saw wages stagnate last year as threats and responsibilities grew First seen on theregister.com Jump to article: www.theregister.com/2026/04/27/from_a_massive_skills_gap/
-
CISA Hunts for Cisco Backdoor Spotted on Federal Network
‘Firestarter’ Backdoor Can Survive Reboots, Upgrades and Standard Fixes. The Cybersecurity and Infrastructure Security Agency issued an emergency directive warning a newly-discovered Cisco backdoor can survive routine remediation processes, forcing agencies to investigate edge devices that anchor federal firewall and VPN security. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/cisa-hunts-for-cisco-backdoor-spotted-on-federal-network-a-31505
-
Firestarter malware survives Cisco firewall updates, security patches
Cybersecurity agencies in the U.S. and U.K. are warning about a custom malware called Firestarter persisting on Cisco Firepower and Secure Firewall devices running Adaptive Security Appliance (ASA) or Firepower Threat Defense (FTD) software. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/firestarter-malware-survives-cisco-firewall-updates-security-patches/
-
Firestarter malware survives Cisco firewall updates, security patches
Cybersecurity agencies in the U.S. and U.K. are warning about a custom malware called Firestarter persisting on Cisco Firepower and Secure Firewall devices running Adaptive Security Appliance (ASA) or Firepower Threat Defense (FTD) software. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/firestarter-malware-survives-cisco-firewall-updates-security-patches/

