Latest security news
- Attackers breached ConnectWise, compromised customer ScreenConnect instances
- New Linux Vulnerabilities Expose Password Hashes via Core Dumps
- Sophisticated Malware Campaign Targets Windows and Linux Systems
- Cryptojacking Campaign Targets DevOps Servers Including Nomad
- #Infosec2025: Ransomware Drill to Spotlight Water Utility Cyber Risks in ‘Operation 999’
- Acreed Emerges as Dominant Infostealer Threat Following Lumma Takedown
- Dutch Police Lead Shut Down of Counter AV Service AVCheck
- Product showcase: Smarter pentest reporting and exposure management with PlexTrac
- CISO 3.0: Leading AI governance and security in the boardroom
- 48% of security pros are falling behind compliance requirements
- Mandatory Ransomware Payment Disclosure Begins in Australia
- US Banks Urge SEC to Repeal Cyber Disclosure Rule
- FBI Flags Philippines Tech Company Behind Crypto Scam Infrastructure
- UK MoD Launches New Cyber Warfare Command
- CISA Urged to Enrich KEV Catalog with More Contextual Data
- Why privacy in blockchain must start with open source
- ConnectWise Confirms Hack, “Very Small Number” of Customers Affected
A suspected “sophisticated nation state actor” has compromised ScreenConnect cloud instances of a “very small number” of ConnectWise customers, the company has revealed on Wednesday. “We have not observed any additional suspicious activity in ScreenConnect cloud instances since the patch was released on April 24,” they added on Friday. The patch in question fixes CVE-2025-3935, a ViewState deserialization vulnerability affecting ScreenConnect versions 25.2.3 and earlier, which can allow attackers to inject malicious code and achieve …
(C) Do-Know.com (http://do-know.com/). Do not copy without permission from info at do-know.com.