A pointer to an article about the existence of a corrupted PuTTY build
ran through my feeds, today.
Apparently this was identified in the wild a couple of years ago, and
there are various security filters that have been used in different
places to prevent downloads, catch errant network activity, etcetera.
I know that PuTTY is on the UVM software download page.
Have there been any explicit actions on the UVM network taken to
identify/intercept the bogus PuTTY activity described in the fortinet
EPSCoR Software Engineer