home.social

#panos — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #panos, aggregated by home.social.

  1. Palo Alto Networks Exploits Critical PAN-OS Flaw in Limited Attacks

    Palo Alto Networks has patched a critical flaw in its PAN-OS software, CVE-2026-0300, which allowed hackers to execute malicious code with root privileges - and the company says it's already been exploited in targeted attacks. The vulnerability, a buffer overflow in the User-ID Authentication Portal service, could be triggered by…

    osintsights.com/palo-alto-netw

    #Panos #Cve20260300 #PaloAltoNetworks #BufferOverflow #Exploitation

  2. Palo Alto Networks Exploits Critical PAN-OS Flaw in Limited Attacks

    Palo Alto Networks has patched a critical flaw in its PAN-OS software, CVE-2026-0300, which allowed hackers to execute malicious code with root privileges - and the company says it's already been exploited in targeted attacks. The vulnerability, a buffer overflow in the User-ID Authentication Portal service, could be triggered by…

    osintsights.com/palo-alto-netw

    #Panos #Cve20260300 #PaloAltoNetworks #BufferOverflow #Exploitation

  3. Palo Alto Networks Discloses Active Exploitation of PAN-OS Flaw Enabling Espionage

    Palo Alto Networks has uncovered active exploitation of a high-severity flaw in PAN-OS software, allowing attackers to execute arbitrary code with root privileges and inject shellcode into vulnerable systems. This critical vulnerability, tracked as CVE-2026-0300, enables unauthenticated remote code execution,…

    osintsights.com/palo-alto-netw

    #Panos #Cve20260300 #RemoteCodeExecution #BufferOverflow #PaloAltoNetworks

  4. Palo Alto Networks Discloses Zero-Day Flaw in PAN-OS Software

    Palo Alto Networks has issued a warning about a zero-day flaw in its PAN-OS software, tracked as CVE-2026-0300, which allows unauthenticated remote code execution with root privileges. This buffer overflow vulnerability in the User-ID Authentication Portal poses a high risk to PA-Series and VM-Series firewalls.

    osintsights.com/palo-alto-netw

    #ZeroDay #Cve20260300 #Panos #PaloAltoNetworks #BufferOverflow

  5. Palo Alto Networks Flaw Exploited for Remote Code Execution

    A critical vulnerability in Palo Alto Networks' PAN-OS software has been exploited, allowing hackers to execute malicious code with root privileges on firewalls - and all it takes is a few specially crafted packets. This buffer overflow flaw, tracked as CVE-2026-0300, puts PA-Series and VM-Series firewalls at risk of remote code…

    osintsights.com/palo-alto-netw

    #PaloAltoNetworks #RemoteCodeExecution #Cve20260300 #BufferOverflow #Panos

  6. Palo Alto Networks Flaw Exploited for Remote Code Execution

    A critical vulnerability in Palo Alto Networks' PAN-OS software has been exploited, allowing hackers to execute malicious code with root privileges on firewalls - and all it takes is a few specially crafted packets. This buffer overflow flaw, tracked as CVE-2026-0300, puts PA-Series and VM-Series firewalls at risk of remote code…

    osintsights.com/palo-alto-netw

    #PaloAltoNetworks #RemoteCodeExecution #Cve20260300 #BufferOverflow #Panos

  7. Palo Alto: “LOL, we fixed 24 vulns in a random Tuesday update with no CVE alert. Why are you panicking?”

    security.paloaltonetworks.com/

    • No alerts
    • No heads-up

    Just a stealth patch buried in the advisory feed.

    The stats:

    • 24 total CVEs
    • 11 High, 11 Medium
    • 100% discovered externally
    • Average patch delay: 4 FUCKING years for high severity

    All bundled into one advisory.
    Welcome to the Patch Gacha Machine:
    Spin once, fix 24 vulnerabilities (maybe).

    PAN CVEs age like wine… and compromise like whiskey.

    #PANOS #CyberSecurity #CVEs #PatchAndPray #SilentFixes #PSIRTFail #MemeSec #BlueTeamLife #TrustButVerify

  8. Palo Alto: “LOL, we fixed 24 vulns in a random Tuesday update with no CVE alert. Why are you panicking?”

    security.paloaltonetworks.com/

    • No alerts
    • No heads-up

    Just a stealth patch buried in the advisory feed.

    The stats:

    • 24 total CVEs
    • 11 High, 11 Medium
    • 100% discovered externally
    • Average patch delay: 4 FUCKING years for high severity

    All bundled into one advisory.
    Welcome to the Patch Gacha Machine:
    Spin once, fix 24 vulnerabilities (maybe).

    PAN CVEs age like wine… and compromise like whiskey.

    #PANOS #CyberSecurity #CVEs #PatchAndPray #SilentFixes #PSIRTFail #MemeSec #BlueTeamLife #TrustButVerify

  9. Palo Alto: “LOL, we fixed 24 vulns in a random Tuesday update with no CVE alert. Why are you panicking?”

    security.paloaltonetworks.com/

    • No alerts
    • No heads-up

    Just a stealth patch buried in the advisory feed.

    The stats:

    • 24 total CVEs
    • 11 High, 11 Medium
    • 100% discovered externally
    • Average patch delay: 4 FUCKING years for high severity

    All bundled into one advisory.
    Welcome to the Patch Gacha Machine:
    Spin once, fix 24 vulnerabilities (maybe).

    PAN CVEs age like wine… and compromise like whiskey.

    #PANOS #CyberSecurity #CVEs #PatchAndPray #SilentFixes #PSIRTFail #MemeSec #BlueTeamLife #TrustButVerify

  10. Palo Alto: “LOL, we fixed 24 vulns in a random Tuesday update with no CVE alert. Why are you panicking?”

    security.paloaltonetworks.com/

    • No alerts
    • No heads-up

    Just a stealth patch buried in the advisory feed.

    The stats:

    • 24 total CVEs
    • 11 High, 11 Medium
    • 100% discovered externally
    • Average patch delay: 4 FUCKING years for high severity

    All bundled into one advisory.
    Welcome to the Patch Gacha Machine:
    Spin once, fix 24 vulnerabilities (maybe).

    PAN CVEs age like wine… and compromise like whiskey.

    #PANOS #CyberSecurity #CVEs #PatchAndPray #SilentFixes #PSIRTFail #MemeSec #BlueTeamLife #TrustButVerify

  11. Palo Alto: “LOL, we fixed 24 vulns in a random Tuesday update with no CVE alert. Why are you panicking?”

    security.paloaltonetworks.com/

    • No alerts
    • No heads-up

    Just a stealth patch buried in the advisory feed.

    The stats:

    • 24 total CVEs
    • 11 High, 11 Medium
    • 100% discovered externally
    • Average patch delay: 4 FUCKING years for high severity

    All bundled into one advisory.
    Welcome to the Patch Gacha Machine:
    Spin once, fix 24 vulnerabilities (maybe).

    PAN CVEs age like wine… and compromise like whiskey.

    #PANOS #CyberSecurity #CVEs #PatchAndPray #SilentFixes #PSIRTFail #MemeSec #BlueTeamLife #TrustButVerify

  12. Todays #eveningrelaxart was me ttying messy and cheap traditional medium that i have no clue how ppl get good results from.
    For me, doing art with pastells is training in letting go of the illusion that i have controll.

    But these kinds if art are for this purpose and so this is fine.

    #Panos #lordofsoulswebcomic #Pastellkreide #traditionalillustration #traditionalArt

  13. Todays #eveningrelaxart was me ttying messy and cheap traditional medium that i have no clue how ppl get good results from.
    For me, doing art with pastells is training in letting go of the illusion that i have controll.

    But these kinds if art are for this purpose and so this is fine.

    #Panos #lordofsoulswebcomic #Pastellkreide #traditionalillustration #traditionalArt

  14. Todays #eveningrelaxart was me ttying messy and cheap traditional medium that i have no clue how ppl get good results from.
    For me, doing art with pastells is training in letting go of the illusion that i have controll.

    But these kinds if art are for this purpose and so this is fine.

    #Panos #lordofsoulswebcomic #Pastellkreide #traditionalillustration #traditionalArt

  15. Todays #eveningrelaxart was me ttying messy and cheap traditional medium that i have no clue how ppl get good results from.
    For me, doing art with pastells is training in letting go of the illusion that i have controll.

    But these kinds if art are for this purpose and so this is fine.

    #Panos #lordofsoulswebcomic #Pastellkreide #traditionalillustration #traditionalArt

  16. Palo Alto Networks released additional details about CVE-2024-3400: the fact that it is a combination of two bugs in PAN-OS; how an attacker was exploiting it; how disabling telemetry initially worked; and how they fixed it. The timeline from discovery to remediation encompasses the whole blog post. Overall a comprehensive after-action review from a company that notified the public almost immediately of an exploited zero-day. 🔗paloaltonetworks.com/blog/2024

    #CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #ProofofConcept #PANOS #IOC