News
The Register on MSN16d
Suspected Chinese spies right now hijacking buggy Ivanti gear – for third time in 3 yearsSimple denial-of-service blunder turned out to be remote unauth code exec disaster Suspected Chinese government spies have been exploiting a newly disclosed critical bug in Ivanti VPN appliances since ...
Use precise geolocation data and actively scan device characteristics for identification. This is done to store and access information on a device and to provide personalised ads and content, ad and ...
Chinese APT group UNC5221 appears to have studied a recent Ivanti Connect Secure patch to develop a remote code execution ...
IT software vendor Ivanti recently released details of a now-patched critical security vulnerability affecting Ivanti Connect ...
Hackers using Trojans connected to a malware family deployed by Chinese nation-state hackers are actively exploiting a ...
Earlier this month, three critical vulnerabilities in Ivanti Endpoint Manager came under attack. According to CISA, Resurge is similar to SpawnChimera, a variant of the Spawn malware family that ...
Ivanti has released security updates to patch a critical Connect Secure remote code execution vulnerability exploited by a China-linked espionage actor to deploy malware since at least mid-March 2025.
A new malware variant dubbed RESURGE has been uncovered by the US Cybersecurity and Infrastructure Security Agency (CISA) and is targeting Ivanti Connect Secure appliances through a critical ...
Windows versions of the BrickStorm backdoor that the Chinese APT used in the MITRE hack last year have been active for years.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results