One Article Review

Accueil - L'article:
Source itsecurityguru.webp IT Security Guru
Identifiant 5216766
Date de publication 2022-06-17 10:41:03 (vue: 2022-06-17 11:08:02)
Titre Chinese Hackers Exploited Critical Security Vulnerability in Sophos Firewall (Recyclage)
Texte A sophisticated Chinese advanced persistent threat (APT) actor exploited a critical security vulnerability in Sophos’ firewall product that came to public attention earlier this year to infiltrate an unnamed South Asian target as part of a highly-targeted attack. Volexity said in a report, “the attacker implement[ed] an interesting web shell backdoor, create[d] a secondary form […]
Envoyé Oui
Condensat “the actor advanced apt asian attack attacker attention backdoor came chinese create critical earlier exploited firewall form hackers highly implement infiltrate interesting part persistent product public report said secondary security shell sophisticated sophos sophos’ south target targeted threat unnamed volexity vulnerability web year
Tags Vulnerability Threat
Stories
Notes
Move


Les reprises de l'article (1):
Source The_Hackers_News.webp The Hacker News
Identifiant 5214612
Date de publication 2022-06-17 01:39:56 (vue: 2022-06-17 10:07:15)
Titre Chinese Hackers Exploited Sophos Firewall Zero-Day Flaw to Target South Asian Entity
Texte A sophisticated Chinese advanced persistent threat (APT) actor exploited a critical security vulnerability in Sophos' firewall product that came to light earlier this year to infiltrate an unnamed South Asian target as part of a highly-targeted attack. "The attacker implement[ed] an interesting web shell backdoor, create[d] a secondary form of persistence, and ultimately launch[ed] attacks
Envoyé Oui
Condensat actor advanced apt asian attack attacker attacks backdoor came chinese create critical day earlier entity exploited firewall flaw form hackers highly implement infiltrate interesting launch light part persistence persistent product secondary security shell sophisticated sophos south target targeted threat ultimately unnamed vulnerability web year zero
Tags Vulnerability Threat
Stories
Notes
Move


L'article ne semble pas avoir été repris sur un précédent.
My email: