April 25, 2024, 5:49 a.m. | Balaji

GBHackers On Security gbhackers.com

Security researchers at Cisco Talos have uncovered a sophisticated cyber espionage campaign dubbed “ArcaneDoor” conducted by a state-sponsored threat actor tracked as UAT4356 (STORM-1849). This campaign targeted government networks globally by exploiting multiple zero-day vulnerabilities in Cisco’s Adaptive Security Appliance (ASA) firewalls. The attack chain leveraged two custom malware implants – “Line Dancer” and “Line […]


The post Hackers Exploit Cisco Firewall Zero-Days to Hack Government Networks appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News …

actor adaptive security arcanedoor asa attack attack chain campaign cisco cisco talos cyber cyber-attack cyber espionage cyber security cyber security resources espionage exploit exploiting firewall firewalls government hack hackers hackers exploit implants malware networks researchers security security researchers sponsored state state-sponsored threat actor storm talos threat threat actor uncovered vulnerabilities zero-day zero-days zero-day vulnerabilities

Principal Security Engineer

@ Elsevier | Home based-Georgia

Infrastructure Compliance Engineer

@ NVIDIA | US, CA, Santa Clara

Information Systems Security Engineer (ISSE) / Cybersecurity SME

@ Green Cell Consulting | Twentynine Palms, CA, United States

Sales Security Analyst

@ Everbridge | Bengaluru

Alternance – Analyste Threat Intelligence – Cybersécurité - Île-de-France

@ Sopra Steria | Courbevoie, France

Third Party Cyber Risk Analyst

@ Chubb | Philippines