Phoenix IT

Category: Application Development

Fortra GoAnywhere CVSS 10 Flaw Exploited as 0-Day a Week Before Public Disclosure

Fortra GoAnywhere CVSS 10 Flaw Exploited as 0-Day a Week Before Public Disclosure

Cybersecurity company watchTowr Labs has disclosed that it has “credible evidence” of active exploitation of the recently disclosed security flaw in Fortra GoAnywhere Managed File Transfer (MFT) software as early as September 10, 2025, a whole week before it was publicly disclosed. “This is not ‘just’ a CVSS 10.0 flaw in a solution long favored

Read More
Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware

Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware

The U.K. National Cyber Security Centre (NCSC) has revealed that threat actors have exploited the recently disclosed security flaws impacting Cisco firewalls as part of zero-day attacks to deliver previously undocumented malware families like RayInitiator and LINE VIPER. “The RayInitiator and LINE VIPER malware represent a significant evolution on that used in the previous campaign, both in sophistication and its

Read More
Microsoft 365 Outage Disrupts Teams, Azure, and Global Services

Microsoft 365 Outage Disrupts Teams, Azure, and Global Services

Starting at approximately 7:40 AM UTC, Microsoft Corporation experienced a significant, widespread service disruption, impacting its global network of cloud services. The company confirmed it is investigating the issue, which appears to stem from a critical internal failure. According to Microsoft, the investigation is focused on load balancing infrastructure and a significant capacity loss across

Read More
F5 Discloses Major Breach by Nation-State Actor, Source Code Stolen

F5 Discloses Major Breach by Nation-State Actor, Source Code Stolen

A threat actor has breached the internal systems of F5, Inc. (F5), a prominent American technology firm specializing in application security and delivery. In a disclosure filed with the U.S. Securities and Exchange Commission, F5 attributed the intrusion to a “highly sophisticated nation-state threat actor” who maintained long-term, persistent access to critical company environments. The

Read More