News
If you use Global Protect to connect your organization's environment, but the VPN does not work on a hotspot check this post ...
Hosted on MSN8mon
Rogue VPN servers used to spread malware via malicious updates - MSNThe first clean version of NetExtender Windows is 10.2.341. For Palo Alto, users should either install GlobalProtect 6.2.6, or run their VPN client in FIPS-CC mode.
A set of vulnerabilities dubbed "NachoVPN" allows rogue VPN servers to install malicious updates when unpatched Palo Alto and SonicWall SSL-VPN clients connect to them.
The GlobalProtect VPN was not ‘the source of the vulnerability or impacted’ in the ransomware attack against distribution giant Ingram Micro, Palo Alto Networks says.
The first clean version of NetExtender Windows is 10.2.341. For Palo Alto, users should either install GlobalProtect 6.2.6, or run their VPN client in FIPS-CC mode.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results