Jan. 12, 2024, 3:04 p.m. | Simon Hendery

SC Magazine feed for Policy www.scmagazine.com

Two vulnerabilities in Ivanti Connect Secure VPN devices can be chained together by a threat actor to craft malicious requests and execute arbitrary commands on the system.

actively exploited actor can cloud security connect devices exploited ivanti malicious patchconfiguration-management products requests secure vpn system threat threat actor threat intelligence vpn vulnerabilities zero-days

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Senior Security Analyst

@ Oracle | United States

Associate Vulnerability Management Specialist

@ Diebold Nixdorf | Hyderabad, Telangana, India

Cybersecurity Architect, Infrastructure & Technical Security

@ KCB Group | Kenya