Palo Alto Networks has issued a security advisory regarding a critical vulnerability in its GlobalProtect app, identified as CVE-2024-5921. The flaw stems from inadequate certificate validation, which allows attackers to connect the GlobalProtect app to arbitrary servers. This enables the installation of malicious root certificates on the affected endpoints. These compromised certificates could then be used to sign and install malicious software, posing a significant security risk. The vulnerability impacts all versions of the GlobalProtect app 6.3, 6.1, 6.0, 5.1, and the UWP app on Windows, as well as GlobalProtect app 6.2 on macOS and Linux. Additionally, versions prior to 6.2.6 on Windows are affected. While Palo Alto Networks has not reported any confirmed exploitation of the vulnerability, it has become aware of public discussions regarding the issue, increasing the potential for attacks. To address the vulnerability, Palo Alto Networks recommends updating to GlobalProtect app version 6.2.6 or later on Windows. For other versions, users can mitigate the issue by enabling FIPS-CC mode or installing the app with specific parameters to enforce stricter certificate validation. These steps involve using the "FULLCHAINCERTVERIFY" key and specifying the certificate store and location during installation. Organizations are urged to take immediate action to safeguard their endpoints from potential exploitation.
Microsoft has introduced a centralized script library within Microsoft Defender to streamline security operations and improve response efficiency. The new capability enables securi...
A new phishing campaign is targeting job seekers by using fake Google Forms pages to steal login credentials. Cybercriminals have registered a fraudulent domain designed to closely...
A new investigation by Citizen Lab has uncovered forensic indicators suggesting that advanced mobile data extraction software was deployed on a Samsung Android phone belonging to K...