<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Pan-Os on it-learn.io | IT, Networking &amp; Cybersecurity Blog</title><link>https://blog.it-learn.io/tags/pan-os/</link><description>Recent content in Pan-Os on it-learn.io | IT, Networking &amp; Cybersecurity Blog</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Wed, 06 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://blog.it-learn.io/tags/pan-os/index.xml" rel="self" type="application/rss+xml"/><item><title>PAN-OS Zero-Day CVE-2026-0300 Exploited — DAEMON Tools Supply Chain, Canvas LMS Breach, CloudZ OTP Theft</title><link>https://blog.it-learn.io/posts/2026-05-06-pan-os-zero-day-cve-2026-0300-exploited-daemon-tools-supply/</link><pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate><guid>https://blog.it-learn.io/posts/2026-05-06-pan-os-zero-day-cve-2026-0300-exploited-daemon-tools-supply/</guid><description>Critical PAN-OS User-ID portal zero-day under active exploitation with patch due May 8, a surgical supply-chain attack through DAEMON Tools targeting government labs, ShinyHunters claiming 280M education records from Canvas LMS, and a CloudZ RAT plugin that steals MFA codes through Windows Phone Link without touching the phone.</description></item></channel></rss>