Tag: Ivanti
-
The Register: Suspected Chinese spies right now hijacking buggy Ivanti gear – for third time in 3 years
Source URL: https://www.theregister.com/2025/04/03/suspected_chines_snoops_hijacked_buggy/ Source: The Register Title: Suspected Chinese spies right now hijacking buggy Ivanti gear – for third time in 3 years Feedly Summary: Simple denial-of-service blunder turned out to be a remote unauth code exec disaster Suspected Chinese government spies have been exploiting a newly disclosed critical bug in Ivanti VPN appliances since…
-
The Register: FCC stands up Council on National Security to fight China in ways that CISA used to
Source URL: https://www.theregister.com/2025/03/16/infosec_news_in_brief/ Source: The Register Title: FCC stands up Council on National Security to fight China in ways that CISA used to Feedly Summary: PLUS: Alleged Garantex admin arrested in India; Google deletes more North Korean malware Infosec In Brief United States Federal Communications Commission chair Brendan Carr has unveiled plans to form a…
-
Alerts: CISA Adds Five Known Exploited Vulnerabilities to Catalog
Source URL: https://www.cisa.gov/news-events/alerts/2025/03/10/cisa-adds-five-known-exploited-vulnerabilities-catalog Source: Alerts Title: CISA Adds Five Known Exploited Vulnerabilities to Catalog Feedly Summary: CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2025-25181 Advantive VeraCore SQL Injection Vulnerability CVE-2024-57968 Advantive VeraCore Unrestricted File Upload Vulnerability CVE-2024-13159 Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability CVE-2024-13160 Ivanti…
-
The Register: Ransomware criminals love CISA’s KEV list – and that’s a bug, not a feature
Source URL: https://www.theregister.com/2025/02/28/cisa_kev_list_ransomware/ Source: The Register Title: Ransomware criminals love CISA’s KEV list – and that’s a bug, not a feature Feedly Summary: 1 in 3 entries are used to extort civilians, says new paper Fresh research suggests attackers are actively monitoring databases of vulnerabilities that are known to be useful in carrying out ransomware…