
Network Security News
The latest network security stories, summarized by AI
Featured Network Security Stories


RondoDox Botnet Exploits React2Shell Flaw to Hijack IoT Devices and Servers
Cybersecurity researchers have uncovered a nine-month campaign where the RondoDox botnet exploited the critical React2Shell vulnerability (CVE-2025-55182) to hijack IoT devices and web servers, deploying malware, cryptocurrency miners, and Mirai variants, with the threat still active as of December 2025. Organizations are urged to update vulnerable software, segment IoT devices, and enhance monitoring to prevent infection.

More Top Stories
Cisco Issues Urgent Fix for Critical IOS Zero-Day Exploits
The Hacker News•3 months ago
SonicWall Urges Password Resets Following Cloud Backup Breach
The Hacker News•3 months ago
More Network Security Stories
New DDoS Flaws Enable Attackers to Turn Domain Controllers into Botnets
Originally Published 5 months ago — by The Hacker News

Researchers have discovered a new technique called Win-DDoS that exploits flaws in Windows LDAP and RPC protocols to turn public domain controllers into a powerful botnet for DDoS attacks, without requiring code execution or credentials, and identified multiple related DoS vulnerabilities that can be exploited remotely or internally, challenging assumptions about internal system safety.
Critical Cisco Vulnerability in Unified CM Exposes Root Access and Urges Phone Replacement
Originally Published 6 months ago — by The Hacker News

Cisco has issued security updates for a critical vulnerability (CVE-2025-20309) in Unified Communications Manager that allows attackers to gain root access using static credentials, potentially leading to severe network compromise. The flaw affects multiple versions and was discovered during internal testing, with no evidence of active exploitation yet.
CISA and Palo Alto Networks Alert on Active Exploitation of Firewall Vulnerabilities
Originally Published 1 year ago — by The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has flagged two critical vulnerabilities in Palo Alto Networks' Expedition software, which are being actively exploited. These flaws, CVE-2024-9463 and CVE-2024-9465, could allow attackers to execute arbitrary OS commands or access sensitive data. Federal agencies are required to update their systems by December 5, 2024. Palo Alto Networks has released patches and is investigating a new remote command execution vulnerability affecting some firewall interfaces.
"CISA Issues Alert for Active Attacks on Palo Alto Networks and Sisense"
Originally Published 1 year ago — by The Hacker News

Palo Alto Networks has issued a warning about a critical vulnerability, CVE-2024-3400, in its PAN-OS software used in GlobalProtect gateways, with a maximum severity score. The flaw allows unauthenticated attackers to execute arbitrary code with root privileges on affected firewalls. Versions PAN-OS < 11.1.2-h3, PAN-OS < 11.0.4-h1, and PAN-OS < 10.2.9-h1 are impacted, with fixes expected on April 14, 2024. The company is aware of limited attacks exploiting the vulnerability and recommends enabling Threat ID 95187 for protection. Cybersecurity firm Volexity discovered and reported the bug, and Chinese threat actors have been increasingly exploiting zero-day flaws in various network security products.