Tag “Fortinet”

Microsoft Neutralizes Iran-Based Lebanese Hackers Targeting Israeli Firms

Microsoft recently announced that it has taken action to mitigate harmful activities linked to a previously unidentified hacker group known as Polonium. This group has been exploiting OneDrive for malicious purposes, prompting Microsoft to intervene. In addition to terminating the accounts connected to this Lebanon-based group, the Microsoft Threat Intelligence…

Read MoreMicrosoft Neutralizes Iran-Based Lebanese Hackers Targeting Israeli Firms

Ivanti Addresses Critical Vulnerabilities in Connect Secure and Policy Secure – Urgent Update Recommended

Ivanti Issues Urgent Security Updates Amid Exploitation Risks Ivanti has recently announced critical security updates aimed at addressing multiple vulnerabilities identified in its products—specifically Connect Secure (ICS), Policy Secure (IPS), and Cloud Services Application (CSA). These flaws pose significant risks, potentially enabling attackers to execute arbitrary code on affected systems.…

Read MoreIvanti Addresses Critical Vulnerabilities in Connect Secure and Policy Secure – Urgent Update Recommended

Newly Discovered Chinese Espionage Hacking Group Exposed

Cyberwarfare / Nation-State Attacks, Fraud Management & Cybercrime, Network Firewalls, Network Access Control ‘RedNovember’ Engages Organizations Across the US, Asia, and Europe Akshaya Asokan (asokan_akshaya) • September 25, 2025 Image: Shutterstock/ISMG A recently identified hacking group, linked to extensive compromises of edge devices, has been confirmed as state-aligned with China,…

Read MoreNewly Discovered Chinese Espionage Hacking Group Exposed

Critical Update: Microsoft Addresses 57 Security Vulnerabilities, 6 of Which Are Actively Exploited Zero-Days

On Tuesday, Microsoft rolled out security updates addressing a total of 57 vulnerabilities, including six that have been actively exploited in the wild. These updates are particularly crucial for organizations concerned about potential security breaches, as they rectify flaws that could be leveraged by malicious actors. Among the 57 identified…

Read MoreCritical Update: Microsoft Addresses 57 Security Vulnerabilities, 6 of Which Are Actively Exploited Zero-Days

Chinese Hackers Compromise Juniper Networks Routers Using Tailored Backdoors and Rootkits

A recent report from Mandiant has revealed that the Chinese cyber espionage group known as UNC3886 is actively targeting outdated MX Series routers from Juniper Networks. This campaign is aimed at deploying custom backdoors, demonstrating a tactical shift towards exploiting internal networking infrastructure. According to Mandiant, the backdoors utilized diverse…

Read MoreChinese Hackers Compromise Juniper Networks Routers Using Tailored Backdoors and Rootkits

Winnti APT41 Aims at Japanese Companies in RevivalStone Cyber Espionage Operation

A new cyber campaign named RevivalStone has been attributed to the China-linked threat actor known as Winnti, targeting Japanese firms in the manufacturing, materials, and energy sectors as recently as March 2024. This initiative, as outlined by Japanese cybersecurity firm LAC, coincides with activities tracked by Trend Micro as Earth…

Read MoreWinnti APT41 Aims at Japanese Companies in RevivalStone Cyber Espionage Operation

New Variant of Snake Keylogger Uses AutoIt Scripting to Bypass Detection

A new variant of the Snake Keylogger is intensifying its malicious activities, primarily targeting Windows users in countries including China, Turkey, Indonesia, Taiwan, and Spain. According to Fortinet FortiGuard Labs, this malware has been linked to over 280 million blocked infection attempts globally since the beginning of the year. Snake…

Read MoreNew Variant of Snake Keylogger Uses AutoIt Scripting to Bypass Detection

Tenable, Qualys, and Workday: Overview of Data Breaches and Security Enhancements

This week, cybersecurity concerns took center stage as several prominent companies revealed serious data breaches linked to vulnerabilities in third-party service providers. The incidents, notably affecting Tenable, Qualys, and Workday, underscore the significant risks inherent in today’s digital supply chain. Tenable and Qualys, well-known leaders in vulnerability management, disclosed that…

Read MoreTenable, Qualys, and Workday: Overview of Data Breaches and Security Enhancements