Massive brute-force wave hits Palo Alto VPNs with 2.3M attacks (November 24, 2025).
Attackers scanned for exposed GlobalProtect portals, stuffing leaked/reused creds to guess network access, risking unauthorized entry into corporate systems worldwide; full impact unknown, with surges from 600K IPs.
Zsub fixes this.
- No central gateways to attack: Connections self-organize P2P.
- No credentials to stuff: Auth with proofs of relationships between rotating self-custodial keys.
- Targeting much harder: no honeypots and no linkable metadata exposed on the wire.
Actually zero trust, just like Bitcoin.
Not your keys, not your network.
Read the white paper. Sign up for beta.
https://zsubmesh.net
Zsubmariner
co@zsubmesh.net
npub1csmg...cakv
Not your keys, not your network.
Notes (3)
Hackers exploit Oracle EBS zero-day and pivot through local creds to steal and leak sensitive data from manufacturers and universities (November 19, 2025).
Clop exfiltrated TBs of aggregated ERP data from 10+ U.S. orgs—PII for 10K+ employees (SSNs, contacts), financial records, contracts, supply chains, manufacturing blueprints, student info—cascading supply-chain leaks to unrelated partners.
Zsub fixes this.
- No central credential stores to pivot through.
- No aggregated data plane to cascade breach across orgs.
- No shared reset flows or SSO bypasses to chain exploits.
- Self-custodial HD keys and selective-disclosure auth break the kill chain at the very first link.
Actually zero trust, just like Bitcoin.
Not your keys, not your network.
Read the white paper.
https://zsubmesh.net
@GHOST is this on your radar?
https://youtu.be/aeXIgKuX_zY