The stolen information could help intruders plan follow-up attacks and breach more organizations, Cisco researchers said.
Related Articles
All CyberSecurityDive →Attackers exploiting Cisco vulnerabilities tied to Salt Typhoon campaign
Dive Brief: GreyNoise researchers observed active exploitation of two Cisco vulnerabilities, CVE-2018-0171 and CVE-2023-20198, which reportedly have been used in recent attacks by the Chinese nation-state…
Hackers steal sensitive Red Hat customer data after breaching GitLab repository
Listen to the article 2 min This audio is auto-generated. Please let us know if you have feedback. A hacker group claims to have breached…
The CVE Program, a bedrock of global cyber defense, is teetering on the brink
A funding scare, AI and similar international initiatives are raising existential questions about the program’s future. Source link
How to stop insider-driven data loss in browser sessions
Not all data security risks involving the web browser come from external adversaries. A large portion comes from well-meaning employees or contractors making mistakes. Accidental…
CISA’s latest cuts reignite concerns among Democratic lawmakers
Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. The Trump administration’s major cuts to the…
React2Shell attacks expand widely across multiple sectors
Microsoft researchers warned that “several hundred machines” across a wide range of organizations have been compromised via the exploitation of a critical vulnerability in React…

