Welcome to the Threat and Vulnerability discussion forum. This forum exists as a resource for security professionals to discuss and share information pertaining to the topics of threats and vulnerabilities.
Not a Live Community member? Simply click here and register for free!
Please use the information from this forum at your own risk and make sure to verify any information presented. For information on contacting Palo Alto Networks support, click here.
To report a vulnerability, click here.
Welcome to the Threat and Vulnerability Forum The purpose of this forum is to discuss security vulnerabilities...03-27-2017 Posted by N/A
Hello everyone,I am a newbie here. Perhaps anyone here can tell me how to set my PA-28 firewall toblock unauth...01-14-2021 Posted by encikremi
Hi everyone,We are using PAN OS 9.1.5.Our internal hosts and DNS server are in different PA Zones.We have a po...12-20-2020 Posted by rjdahav163
We have done VAPT on our Global protect URL link and identified 3 VA,Kindly check and help resolving this at e...12-14-2020 Posted by PankajDhobe
A new research has demonstrated a technique that allow an attacker to bypass firewall protection and remotely ...11-02-2020 Posted by Naweed
Hi Team,We have received some list of Malicious HASH files and asked us to take the necessary action. But whil...11-29-2020 Posted by SahulH
Hey guys,I've inherited a ruleset that is blocking Java CLASS file downloads, but not Java JAR files. I am not...12-03-2020 Posted by locampo
Hi All,After upgrade to 9.1.5, i noticed the Severity level high and medium threat actions are allowed and som...11-19-2020 Posted by CyberEye