News

GlobalProtect 6.3.2-566, 6.3.3-h1 and 6.2.8-h2, the last two of which are expected in June, for macOS and Windows fix the bug. In addition, a vulnerability in Palo Alto Networks Cortex XDR Broker ...
Personally, I commend GlobalProtect’s impressive ability to identify what devices are connecting to the VPN and whether they are managed (company-owned or operated) or unmanaged (employee-owned ...
A recent surge in login attempts targeting Palo Alto Networks’ PAN-OS GlobalProtect portals mainly located in the U.S. could be a precursor to a large-scale exploitation of unpatched or zero-day ...
In addition to targeting GlobalProtect portals, the scans also hit other appliances running PAN-OS, such as PAN-OS Crawler. It’s similar to activity flagged by Cisco in April last year, when threat ...
GlobalProtect not updating prevents users from installing the latest features and fixes for the app. Network connection issues, incorrect proxy settings, and a corrupt GlobalProtect app cache can ...
Silk Typhoon is a Chinese state actor focused on espionage campaigns targeting a wide range of industries in the US and throughout the world. In recent months, Silk Typhoon has shifted to performing ...
Palo Alto Networks Globalprotect app is used to establish VPN connections. A vulnerability allows attackers to inject malicious code and install it on vulnerable computers with elevated privileges ...
A set of vulnerabilities dubbed "NachoVPN" allows rogue VPN servers to install malicious updates when unpatched Palo Alto and SonicWall SSL-VPN clients connect to them.
Find and launch the GlobalProtect application. Click Connect.; Sign in using your Monash email address and password and authenticate: if using Okta Verify, click Send Push and then approve the sign in ...
A vulnerability in the GlobalProtect portal in Palo Alto Networks PAN-OS software enables a malicious authenticated GlobalProtect user to impersonate another GlobalProtect user. Active GlobalProtect ...