Palo Alto Networks Under Siege: Brute-Force Attacks Target GlobalProtect Portals!
Palo Alto Networks is witnessing brute-force login attempts on PAN-OS GlobalProtect gateways. This comes after warnings of increased suspicious login scanning activity. Despite the login frenzy, there’s no evidence of vulnerability exploitation. So, is it a global hacker Zumba class or just overly enthusiastic password guessers? Stay tuned for updates!

Hot Take:
Looks like cybercriminals are playing a high-stakes game of “Guess My Password” with Palo Alto Networks’ GlobalProtect gateways. Spoiler alert: It’s not “123456”.
Key Points:
- Palo Alto Networks reports brute-force attacks on PAN-OS GlobalProtect gateways.
- Threat actors began login scanning activity on March 17, 2025.
- Peak activity involved 23,958 unique IP addresses.
- Systems in the US, UK, Ireland, Russia, and Singapore are primarily targeted.
- Key recommendations include updating PAN-OS and enforcing multi-factor authentication.
Already a member? Log in here