[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fW--WnNfn0do3DU567Xr5LNCXqhMCNEgaSkFc3RkcBKU":3},{"article":4,"iocs":47},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":27,"category":28,"article_tags":31},"f117efce-ebbf-43ee-9f4f-6416f0b43f8a","⚠️ A threat actor is selling tested Palo Alto GlobalProtect VPN credentials for 5 corporate netwo...","a-threat-actor-is-selling-tested-palo-alto-globalprotect-vpn-credentials-for-5-c-156089","⚠️ A threat actor is selling tested Palo Alto GlobalProtect VPN credentials for 5 corporate networks across 5 different countries, spanning telecommunications, education, business services, and non-profit sectors. The seller states the credentials have been tested but host and https:\u002F\u002Ft.co\u002Fn4IR4fieyq","A threat actor is offering stolen and tested Palo Alto GlobalProtect VPN credentials for sale, targeting five corporate networks across five countries in the telecommunications, education, business services, and nonprofit sectors. The credentials have been verified as functional, representing a significant access risk to affected organizations. This incident highlights the ongoing threat of compromised VPN credentials being leveraged for initial access and lateral movement.","Threat actor selling validated Palo Alto GlobalProtect VPN credentials for five corporate networks globally.",null,"https:\u002F\u002Fx.com\u002FDarkWebInformer\u002Fstatus\u002F2049631326156845135","https:\u002F\u002Fpbs.twimg.com\u002Fmedia\u002FHHHA0yHWsAAFYh6.jpg","2026-04-29T23:26:03+00:00","2026-04-30T00:00:09.304465+00:00",8,[18,21,24],{"name":19,"type":20},"Palo Alto Networks","vendor",{"name":22,"type":23},"Unknown credential seller","threat_actor",{"name":25,"type":26},"VPN access credentials","technology","2c8f44d4-b56e-47cf-9677-04f22c9ee78d",{"id":27,"icon":11,"name":29,"slug":30},"Identity & Access","identity-access",[32,37,42],{"category":33},{"id":34,"icon":11,"name":35,"slug":36},"2e06f76c-d5b9-4f54-9eef-4d3447b10730","Breaches","breaches",{"category":38},{"id":39,"icon":11,"name":40,"slug":41},"80544778-fabb-4dcd-aa35-17492e5dcf4f","Vulnerabilities","vulnerabilities",{"category":43},{"id":44,"icon":11,"name":45,"slug":46},"e7b231c8-5f79-4465-8d38-1ef13aea5a14","Threat Intelligence","threat-intelligence",[]]