April 24, 2024, 6:26 p.m. | Zeljka Zorz

Help Net Security www.helpnetsecurity.com

A state-sponsored threat actor has managed to compromise Cisco Adaptive Security Appliances (ASA) used on government networks across the globe and use two zero-day vulnerabilities (CVE-2024-20353, CVE-2024-20359) to install backdoors on them, Cisco Talos researchers have shared on Wednesday. First confirmed activity observed by a Cisco customer dates to early January 2024 but the actual attacks started in November 2023. “Further, we have identified evidence that suggests this capability was being tested and developed as … More →


The post …

0 day actor adaptive security asa backdoors cisa cisco cisco asa cisco talos compromise customer cve cve-2024 devices don't miss firewall government government-backed attacks hackers hot stuff install lumen managed microsoft ncsc networks researchers security security update sponsored state state-sponsored threat actor talos threat threat actor vulnerabilities zero-day zero-days zero-day vulnerabilities

QA Customer Response Engineer

@ ORBCOMM | Sterling, VA Office, Sterling, VA, US

Enterprise Security Architect

@ Booz Allen Hamilton | USA, TX, San Antonio (3133 General Hudnell Dr) Client Site

DoD SkillBridge - Systems Security Engineer (Active Duty Military Only)

@ Sierra Nevada Corporation | Dayton, OH - OH OD1

Senior Development Security Analyst (REMOTE)

@ Oracle | United States

Software Engineer - Network Security

@ Cloudflare, Inc. | Remote

Software Engineer, Cryptography Services

@ Robinhood | Toronto, ON