Get a Pentest and security assessment of your IT network.

Cyber Security

Pulse Secure VPN zero-day used to hack defense firms, govt orgs

A zero-day authentication bypass vulnerability in the Pulse Connect Secure (PCS) SSL VPN appliance is actively exploited in attacks against worldwide organizations and focused on US Defense Industrial base (DIB) networks. The vulnerability can be mitigated on some gateways by disabling Windows File Share Browser and Pulse Secure Collaboration features. FireEye suspects that the UNC2630 threat actor may have ties to APT5, a known APT group that operates on behalf of the Chinese government, based on “strong similarities to historic intrusions dating back to 2014 and 2015″””

Source: https://www.bleepingcomputer.com/news/security/pulse-secure-vpn-zero-day-used-to-hack-defense-firms-govt-orgs/

Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation