Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Scanning Activity on Palo Alto Networks Portals Jump 500% in One Day

Scanning Activity on Palo Alto Networks Portals Jump 500% in One Day

Posted on October 4, 2025October 4, 2025 By CWS

Oct 04, 2025Ravie LakshmananVulnerability / Community Safety
Risk intelligence agency GreyNoise disclosed on Friday that it has noticed a spike in scanning exercise concentrating on Palo Alto Networks login portals.
The corporate stated it noticed an almost 500% improve in IP addresses scanning Palo Alto Networks login portals on October 3, 2025, the best stage recorded within the final three months. It described the site visitors as focused and structured, and aimed primarily at Palo Alto login portals.
As many as 1,300 distinctive IP addresses have participated within the effort, a big leap from round 200 distinctive IP addresses noticed earlier than. Of those IP addresses, 93% are categorised as suspicious and seven% as malicious.
The overwhelming majority of the IP addresses are geolocated to the U.S., with smaller clusters detected within the U.Ok., the Netherlands, Canada, and Russia.

“This Palo Alto surge shares traits with Cisco ASA scanning occurring previously 48 hours,” GreyNoise famous. “In each circumstances, the scanners exhibited regional clustering and fingerprinting overlap within the tooling used.”
“Each Cisco ASA and Palo Alto login scanning site visitors previously 48 hours share a dominant TLS fingerprint tied to infrastructure within the Netherlands.”
In April 2025, GreyNoise reported an identical suspicious login scanning exercise concentrating on Palo Alto Networks PAN-OS GlobalProtect gateways, prompting the community safety firm to induce prospects to make sure that they’re operating the newest variations of the software program.

The event comes as GreyNoise famous in its Early Warning Indicators report again in July 2025 that surges in malicious scanning, brute-forcing, or exploit makes an attempt are sometimes adopted by the disclosure of a brand new CVE affecting the identical know-how inside six weeks.
In early September, Greynoise warned about suspicious scans that occurred as early as late August, concentrating on Cisco Adaptive Safety Equipment (ASA) gadgets. The primary wave originated from over 25,100 IP addresses, primarily situated in Brazil, Argentina, and the U.S.

Weeks later, Cisco disclosed two new zero-days in Cisco ASA (CVE-2025-20333 and CVE-2025-20362) that had been exploited in real-world assaults to deploy malware households like RayInitiator and LINE VIPER.
Knowledge from the Shadowserver Basis reveals that over 45,000 Cisco ASA/FTD situations, out of which greater than 20,000 are situated within the U.S. and about 14,000 are situated in Europe, are nonetheless inclined to the 2 vulnerabilities.

The Hacker News Tags:Activity, Alto, Day, Jump, Networks, Palo, Portals, Scanning

Post navigation

Previous Post: Discord Data Breach – Customers Personal Data and Scanned Photo IDs leaked
Next Post: New CometJacking Attack Let Attackers Turn Perplexity Browser Against You in One Click

Related Posts

Newly Patched Critical Microsoft WSUS Flaw Comes Under Active Exploitation Newly Patched Critical Microsoft WSUS Flaw Comes Under Active Exploitation The Hacker News
SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks The Hacker News
MS Teams Hack, MFA Hijacking, B Crypto Heist, Apple Siri Probe & More MS Teams Hack, MFA Hijacking, $2B Crypto Heist, Apple Siri Probe & More The Hacker News
Critical n8n Flaw (CVSS 9.9) Enables Arbitrary Code Execution Across Thousands of Instances Critical n8n Flaw (CVSS 9.9) Enables Arbitrary Code Execution Across Thousands of Instances The Hacker News
Google Chrome Zero-Day CVE-2025-2783 Exploited by TaxOff to Deploy Trinper Backdoor Google Chrome Zero-Day CVE-2025-2783 Exploited by TaxOff to Deploy Trinper Backdoor The Hacker News
40 npm Packages Compromised in Supply Chain Attack Using bundle.js to Steal Credentials 40 npm Packages Compromised in Supply Chain Attack Using bundle.js to Steal Credentials The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News