helvede.net is one of the many independent Mastodon servers you can use to participate in the fediverse.
Velkommen til Helvede, fediversets hotteste instance! Vi er en queerfeministisk server, der shitposter i den 9. cirkel. Welcome to Hell, We’re a DK-based queerfeminist server. Read our server rules!

Server stats:

163
active users

#globalprotect

0 posts0 participants0 posts today
The New Oil<p>Nearly 24,000 IPs behind wave of <a href="https://mastodon.thenewoil.org/tags/PaloAlto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PaloAlto</span></a> <a href="https://mastodon.thenewoil.org/tags/GlobalProtect" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GlobalProtect</span></a> scans</p><p><a href="https://www.bleepingcomputer.com/news/security/nearly-24-000-ips-behind-wave-of-palo-alto-global-protect-scans/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/nearly-24-000-ips-behind-wave-of-palo-alto-global-protect-scans/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/PAN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PAN</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Harry Sintonen<p>Palo Alto Networks <a href="https://infosec.exchange/tags/GlobalProtect" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GlobalProtect</span></a> has finally added support for <a href="https://infosec.exchange/tags/macOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macOS</span></a> <a href="https://infosec.exchange/tags/Sequoia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sequoia</span></a> in version 6.2.6.</p>
SANS Internet Storm Center - SANS.edu - Go Sentinels!<p>We are getting more reports of exploit attempts for the PAN GlobalProtect vulnerability (CVE-2024-3400). <a href="https://infosec.exchange/tags/paloaltonetworks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>paloaltonetworks</span></a> <a href="https://infosec.exchange/tags/pan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pan</span></a> <a href="https://infosec.exchange/tags/globalprotect" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>globalprotect</span></a></p>
Harry Sintonen<p>CVE-2024-3400 PAN-OS: OS Command Injection <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> in <a href="https://infosec.exchange/tags/GlobalProtect" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GlobalProtect</span></a> Gateway</p><p>A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.</p><p>This issue will be fixed in hotfix releases of PAN-OS 10.2.9-h1 (ETA: By 4/14), PAN-OS 11.0.4-h1 (ETA: By 4/14), and PAN-OS 11.1.2-h3 (ETA: By 4/14), and in all later PAN-OS versions.</p><p>ref: <a href="https://security.paloaltonetworks.com/CVE-2024-3400" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">security.paloaltonetworks.com/</span><span class="invisible">CVE-2024-3400</span></a> <a href="https://infosec.exchange/tags/paloaltonetworks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>paloaltonetworks</span></a> <a href="https://infosec.exchange/tags/commandinjection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>commandinjection</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/cve20243400" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cve20243400</span></a></p>