BeyondTrust Zero-Day Breach Exposed 17 SaaS Customers via Compromised API Key – Go Health Pro

BeyondTrust Zero-Day Breach Exposed 17 SaaS Customers via Compromised API Key – Go Health Pro

Feb 01, 2025Ravie LakshmananVulnerability / Zero-Day BeyondTrust has revealed it completed an investigation into a recent cybersecurity incident that targeted some of the company’s Remote Support SaaS instances by making use of a compromised API key. The company said the breach involved 17 Remote Support SaaS customers and that the API key was used to … Read more

Hackers Exploit Zero-Day in cnPilot Routers to Deploy AIRASHI DDoS Botnet – Go Health Pro

Hackers Exploit Zero-Day in cnPilot Routers to Deploy AIRASHI DDoS Botnet – Go Health Pro

Threat actors are exploiting an unspecified zero-day vulnerability in Cambium Networks cnPilot routers to deploy a variant of the AISURU botnet called AIRASHI to carry out distributed denial-of-service (DDoS) attacks. According to QiAnXin XLab, the attacks have leveraged the security flaw since June 2024. Additional details about the shortcomings have been withheld to prevent further … Read more

Ivanti Zero-Day Vulnerability Exploited: The Details – Go Health Pro

Ivanti Zero-Day Vulnerability Exploited: The Details – Go Health Pro

The UK’s National Cyber Security Centre (NCSC) and its US counterpart have issued an urgent advisory to Ivanti customers after discovering two critical vulnerabilities, one of which is actively exploited. Read on to see how the Ivanti Zero-Day Vulnerability was exploited. Details of how the Ivanti Zero-Day Vulnerability was exploited Ivanti released a security advisory … Read more

Defend Your Business Against Zero-Day Phishing Attack – Go Health Pro

Defend Your Business Against Zero-Day Phishing Attack – Go Health Pro

Phishing attacks are evolving faster than ever, using sophisticated techniques like stealth redirects and zero-day phishing links to evade traditional defences. Recent trends show a concerning rise in phishing attempts targeting social media platforms, such as Instagram and Facebook, alongside document-sharing services like OneDrive. These attacks are not only more frequent but also increasingly effective … Read more

x