Brace Yourself: Palo Alto Networks Targeted in Massive Scanning Surge!
A scanning surge targeting Palo Alto Network GlobalProtect portals has security experts raising their eyebrows—and their defenses. With 23,800 “suspicious” and 154 “malicious” IP addresses, the activity screams “not today, firewall!” GreyNoise warns this could be reconnaissance before a vulnerability reveal. Time to batten down those digital hatches!

Hot Take:
Looks like the hackers have put on their virtual trench coats and are sleuthing around Palo Alto GlobalProtect portals like it’s a Sherlock Holmes mystery! With over 24,000 unique IPs partying at the login gates, it’s clear someone’s throwing a reconnaissance rave. Admins, better get those logs on speed dial and prepare for some firewall yoga!
Key Points:
- Over 24,000 unique source IPs are involved in the scanning activity targeting Palo Alto GlobalProtect portals.
- The peak of activity was observed at 20,000 unique IPs per day, lasting over a week.
- Most IPs are classified as “suspicious,” with 154 confirmed as “malicious.”
- The scanning activity is reminiscent of past reconnaissance linked to vulnerability disclosures.
- GreyNoise advises heightened vigilance and review of logs to prevent potential exploitation.
Already a member? Log in here