Gears & Gadgets

Feds say hackers are likely exploiting critical Fortinet VPN vulnerabilities

Enlarge Getty Images The FBI and the Cybersecurity and Infrastructure Security Agency said that advanced hackers are likely exploiting critical vulnerabilities in the Fortinet FortiOS VPN in an attempt to plant a beachhead to breach medium and large-sized businesses in later attacks. “APT actors may use these vulnerabilities or other common exploitation techniques to gain […]

Gears & Gadgets

Hackers are exploiting a server vulnerability with a severity of 9.8 out of 10

Enlarge Getty Images In a development security pros feared, attackers are actively targeting yet another set of critical server vulnerabilities that leave corporations and governments open to serious network intrusions. The vulnerability this time is in BIG-IP, a line of server appliances sold by Seattle-based F5 Networks. Customers use BIG-IP servers to manage traffic going […]

Gears & Gadgets

Exchange servers first compromised by Chinese hackers hit with ransomware

Enlarge Getty Images Now organizations using Microsoft Exchange have a new security headache: never-before seen ransomware that’s being installed on servers that were already infected by state-sponsored hackers in China. Microsoft reported the new family of ransomware deployment late Thursday, saying that it was being deployed after the initial compromise of servers. Microsoft’s name for […]

Gears & Gadgets

Chinese hackers targeted SolarWinds customers in parallel with Russian op

Enlarge Getty Images By now, most people know that hackers tied to the Russian government compromised the SolarWinds software build system and used it to push a malicious update to some 18,000 of the company’s customers. On Monday, researchers published evidence that hackers from China also targeted SolarWinds customers in what security analysts have said […]

Gears & Gadgets

Hackers are exploiting a critical zeroday in devices from SonicWall

Enlarge Getty Images Network security provider SonicWall said on Monday that hackers are exploiting a critical zeroday vulnerability in one of the devices it sells. The security flaw resides in the Secure Mobile Access 100 series, SonicWall said in an advisory updated on Monday. The vulnerability, which affects SMA 100 firmware versions 10.x, isn’t slated […]

Gears & Gadgets

Security firm Malwarebytes was infected by same hackers who hit SolarWinds

Enlarge Getty Images Security firm Malwarebytes said it was breached by the same nation-state-sponsored hackers who compromised a dozen or more US government agencies and private companies. The attackers are best known for first hacking into Austin, Texas-based SolarWinds, compromising its software-distribution system and using it to infect the networks of customers who used SolarWinds’ […]

Gears & Gadgets

Hackers used 4 zero-days to infect Windows and Android devices

Enlarge Getty Images Google researchers have detailed a sophisticated hacking operation that exploited vulnerabilities in Chrome and Windows to install malware on Android and Windows devices. Some of the exploits were zero-days, meaning they targeted vulnerabilities that at the time were unknown to Google, Microsoft, and most outside researchers (both companies have since patched the […]

Gears & Gadgets

DoJ says SolarWinds hackers breached its Office 365 system and read email

Enlarge Gregory Varnum The US Justice Department has become the latest federal agency to say its network was breached in a long and wide-ranging hack campaign that’s believed to have been backed by the Russian government. In a terse statement issued Wednesday, Justice Department spokesman Marc Raimondi said that the breach wasn’t discovered until December […]

Gears & Gadgets

Hackers are exploiting a backdoor built into Zyxel devices. Are you patched?

Enlarge Zyxel Hackers are attempting to exploit a recently discovered backdoor built into multiple Zyxel device models that hundreds of thousands of individuals and businesses use as VPNs, firewalls, and wireless access points. The backdoor comes in the form of an undocumented user account with full administrative rights that’s hardcoded into the device firmware, a […]