Phoenix IT

Author: origin

Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware

Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware

The U.K. National Cyber Security Centre (NCSC) has revealed that threat actors have exploited the recently disclosed security flaws impacting Cisco firewalls as part of zero-day attacks to deliver previously undocumented malware families like RayInitiator and LINE VIPER. “The RayInitiator and LINE VIPER malware represent a significant evolution on that used in the previous campaign, both in sophistication and its

Read More
Microsoft 365 Outage Disrupts Teams, Azure, and Global Services

Microsoft 365 Outage Disrupts Teams, Azure, and Global Services

Starting at approximately 7:40 AM UTC, Microsoft Corporation experienced a significant, widespread service disruption, impacting its global network of cloud services. The company confirmed it is investigating the issue, which appears to stem from a critical internal failure. According to Microsoft, the investigation is focused on load balancing infrastructure and a significant capacity loss across

Read More
F5 Discloses Major Breach by Nation-State Actor, Source Code Stolen

F5 Discloses Major Breach by Nation-State Actor, Source Code Stolen

A threat actor has breached the internal systems of F5, Inc. (F5), a prominent American technology firm specializing in application security and delivery. In a disclosure filed with the U.S. Securities and Exchange Commission, F5 attributed the intrusion to a “highly sophisticated nation-state threat actor” who maintained long-term, persistent access to critical company environments. The

Read More
Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks

Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks

SonicWall on Wednesday disclosed that an unauthorized party accessed firewall configuration backup files for all customers who have used the cloud backup service. “The files contain encrypted credentials and configuration data; while encryption remains in place, possession of these files could increase the risk of targeted attacks,” the company said. It also noted that it’s working

Read More