Home New Trending Search
About Privacy Terms
#
#CISA
Posts tagged #CISA on Bluesky
Preview
CISA Reveals New Details on RESURGE Malware Exploiting Ivanti Zero-Day Vulnerability   The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published fresh technical insights into RESURGE, a malicious implant leveraged in zero-day attacks targeting Ivanti Connect Secure appliances through the vulnerability tracked as CVE-2025-0282. The latest advisory highlights the implant’s ability to remain undetected on affected systems for extended periods. According to CISA, the malware employs advanced network-level evasion and authentication mechanisms that allow attackers to maintain hidden communication channels with compromised devices. CISA first reported the malware on March 28 last year, noting that it can persist even after system reboots. The implant is capable of creating web shells to harvest credentials, generating new accounts, resetting passwords, and escalating privileges on affected systems. Security researchers at incident response firm Mandiant revealed that the critical CVE-2025-0282 flaw had been actively exploited as a zero-day vulnerability since mid-December 2024. The campaign has been linked to a China-associated threat actor identified internally as UNC5221. Network-level evasion techniques In the updated bulletin, CISA shared additional technical details about the implant. The malware is a 32-bit Linux shared object file named libdsupgrade.so that was recovered from a compromised Ivanti device. RESURGE functions as a passive command-and-control (C2) implant with multiple capabilities, including rootkit, bootkit, backdoor, dropper, proxying, and tunneling functions. Unlike typical malware that regularly sends signals to its command server, RESURGE remains idle until it receives a specific inbound TLS connection from an attacker. This behavior helps it avoid detection by traditional network monitoring systems. When loaded within the ‘web’ process, the implant intercepts the ‘accept()’ function to inspect incoming TLS packets before they reach the web server. It searches for particular connection patterns originating from remote attackers using a CRC32 TLS fingerprint hashing method. If the fingerprint does not match the expected pattern, the traffic is redirected to the legitimate Ivanti server. CISA also explained that the attackers rely on a fake Ivanti certificate to confirm that they are interacting with the malware implant rather than the genuine web server. The agency noted that the forged certificate is used strictly for authentication and verification purposes and does not encrypt communication. However, it also helps attackers evade detection by impersonating the legitimate Ivanti service. Because the fake certificate is transmitted over the internet without encryption, CISA said defenders can potentially use it as a network signature to identify ongoing compromises. Once the fingerprint verification and authentication steps are completed, attackers establish encrypted remote access to the implant through a Mutual TLS session secured with elliptic curve cryptography. "Static analysis indicates the RESURGE implant will request the remote actors' EC key to utilize for encryption, and will also verify it with a hard-coded EC Certificate Authority (CA) key," CISA says. By disguising its traffic to resemble legitimate TLS or SSH communications, the implant maintains stealth while ensuring long-term persistence on compromised systems. Additional malicious components CISA also examined another file, a variant of the SpawnSloth malware named liblogblock.so, which is embedded within the RESURGE implant. Its primary role is to manipulate system logs to conceal malicious activities on infected devices. A third analyzed component, called dsmain, is a kernel extraction script that incorporates the open-source script extract_vmlinux.sh along with the BusyBox collection of Unix/Linux utilities. The script enables the malware to decrypt, alter, and re-encrypt coreboot firmware images while modifying filesystem contents to maintain persistence at the boot level. “CISA’s updated analysis shows that RESURGE can remain latent on systems until a remote actor attempts to connect to the compromised device,” the agency notes. Because of this, the malicious implant "may be dormant and undetected on Ivanti Connect Secure devices and remains an active threat." To address the risk, CISA recommends that administrators review the updated indicators of compromise (IoCs) provided in the advisory to identify potential RESURGE infections and remove the malware from affected Ivanti systems.

CISA Reveals New Details on RESURGE Malware Exploiting Ivanti Zero-Day Vulnerability #CISA #CVE20250282 #IvantiConnectSecurevulnerability

0 0 0 0
Original post on securityaffairs.com

U.S. CISA adds Google Chrome flaws to its Known Exploited Vulnerabilities catalog U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Google Chrome flaws to its Known Exploited Vulner...

#Breaking #News #Hacking #Security #Chrome #CISA #Google #information #security #news #IT […]

0 0 0 0
Preview
Dem House members say they’re in the dark about potential Iran threats to California Rep. Eric Swalwell said the Trump administration is refusing to brief Congress, leaving state leaders without any info about what the FBI “actually knows” about potential threats to California.

#RepSwalwell & #RepThompson also charged that the #Trump admin’s mass deportation campaign has siphoned resources that are crucial to the war effort, including by cutting staffing at the Cybersecurity & Infrastructure Security Agency, which is part of #DHS. www.sfchronicle.com/politics/art... #CISA

0 0 1 0
CISA Adds 2 Flaws to KEV Catalog

~Cisa~
CISA added two actively exploited Google vulnerabilities (Skia and Chromium V8) to its KEV catalog, urging immediate patching.
-
IOCs: CVE-2026-3909, CVE-2026-3910
-
#CISA #KEV #ThreatIntel

0 0 0 0
Post image

CISA flags critical n8n RCE vulnerability CVE-2025-68613 as actively exploited. Over 24,700 instances remain unpatched. Immediate action required! #CyberSecurity #n8n #RCE #CISA Link: thedailytechfeed.com/critical-n8n...

0 0 0 0
Preview
US Agencies Face CISA Deadline Over Critical Cisco SD-WAN Flaw US agencies race to meet a CISA deadline after a critical Cisco SD-WAN Flaw exposed federal networks to long-term intrusion and forced security action.

US agencies face a CISA deadline to secure networks after a critical Cisco SD-WAN flaw (CVE-2026-20127) exposed federal systems to long-term intrusion and admin access.

Read: hackread.com/us-agencies-...

#CyberSecurity #Cisco #SDWAN #CISA #Vulnerability

0 1 0 0

The CISA orders agencies to patch actively exploited n8n vulnerability which enables server takeover The CISA has ordered federal agencies to patch a remote code execution vulnerability in the n...

#Commentary #CISA

Origin | Interest | Match

0 0 0 0
Preview
Critical flaws plague workflow automation platform n8n as hackers exploit the wild CISA warns of active exploitation of CVE-2025-68613, a 9.9-severity remote code execution bug in workflow automation platform n8n affecting 103,000+ users.

Critical flaws plague workflow automation platform n8n as hackers exploit the wild

#Cybersecurity #N8n #Vulnerability #CISA #AusNews

thedailyperspective.org/article/2026-03-12-criti...

1 0 0 0
Original post on securityaffairs.com

U.S. CISA adds a flaw in n8n to its Known Exploited Vulnerabilities catalog The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in n8n to its Known Exploited Vulnerabilitie...

#Breaking #News #Hacking #Security #CISA #CVE-2025-68613 #hacking #news #information #security […]

0 0 0 0
Preview
CISA Flags Actively Exploited n8n RCE Bug as 24700 Instances Remain Exposed might use the vulnerability read more about CISA Flags Actively Exploited n8n RCE Bug as 24700 Instances Remain Exposed

CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed reconbee.com/cisa-flags-a...

#CISA #n8n #RCEbug #cybersecurity #cyberattack

0 0 0 0

📰 CISA Perintahkan Instansi Pemerintah Segera Patch Kerentanan RCE pada n8n

👉 Baca artikel lengkap di sini: ahmandonk.com/2026/03/12/kerentanan-n8...

#cisa #cyberSecurity #hacking #keamananSiber #rce #vulnerability

0 0 0 0
Preview
CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed CISA adds n8n RCE flaw CVE-2025-68613 to KEV after active exploitation; 24,700 exposed instances raise compromise risk.

🚨 La #CISA signale une faille critique n8n (CVE-2025-68613, score 9.9) exploitée activement, exposant 24 700 instances à une exécution de code à distance. Correctif déjà disponible. #CyberSecurity #Automatisation

0 0 0 0
Preview
Iran appears to have conducted a significant cyberattack against a U.S. company, a first since the war started The company, Stryker, said a cyberattack disrupted its “Microsoft environment.”

AMERICA WITHOUT #CISA CYBERSECURITY DEFENSES bc the DHS of Russia

#Iran allies #HackerGroup claimed responsibility for a #cyberattack on a #MedicalTechCompany in what appears to be the first significant instance of Iran’s hacking an American company since the start of the war between the countries.

1 0 0 0
CISA Adds One Known Exploited Vulnerability to Catalog | CISA An official website of the United States government

CISA、既知の悪用された脆弱性を1件カタログに追加

CISA Adds One Known Exploited Vulnerability to Catalog #CISA (Mar 11)

CVE-2025-68613 n8n 動的に管理されるコードリソースの不適切な制御の脆弱性

www.cisa.gov/news-events/...

0 0 0 0
Post image

CISA flags critical vulnerabilities in SolarWinds, Ivanti, and Workspace One under active exploitation. Organizations urged to patch immediately to mitigate risks. #CyberSecurity #CISA #VulnerabilityManagement Link: thedailytechfeed.com/cisa-alerts-...

0 0 0 0
Post image

Hey Anonymous Collective AWS/ORACLE
#CISA #FTC #NSA #USA #democrats #resist #IRS #FDT

0 0 0 0
Preview
CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited CISA adds 3 exploited flaws—SolarWinds, Ivanti, Workspace One—to KEV after attacks, forcing federal patch deadlines in March 2026.

🚨 La #CISA signale des failles activement exploitées sur #SolarWinds, #Ivanti et Workspace One (CVE-2021-22054). Vigilance renforcée sur ces vulnérabilités server-side request forgery (SSRF) ! #CyberSecurity #Automatisation

0 0 0 0

📰 CISA Peringatkan Celah Ivanti EPM yang Baru Ditambal Kini Aktif Dieksploitasi

👉 Baca artikel lengkap di sini: ahmandonk.com/2026/03/11/kerentanan-iv...

#cisa #cyberSecurity #hacking #ivanti #keamananSiber #vulnerability

0 0 0 0
Original post on secureworld.io

Trump Administration Issues National Cyber Strategy, Targets Cybercrime The White House released President Trump's Cyber Strategy for America on March 6, 2026, a seven-page document outlining t...

#Featured #Critical #Infrastructure #White #House #Policy […]

[Original post on secureworld.io]

0 0 0 0
Original post on secureworld.io

Trump Administration Issues National Cyber Strategy, Targets Cybercrime The White House released President Trump's Cyber Strategy for America on March 6, 2026, a seven-page document outlining t...

#Featured #Critical #Infrastructure #White #House #Policy […]

[Original post on secureworld.io]

0 0 0 0
Original post on secureworld.io

Trump Administration Issues National Cyber Strategy, Targets Cybercrime The White House released President Trump's Cyber Strategy for America on March 6, 2026, a seven-page document outlining t...

#Featured #Critical #Infrastructure #White #House #Policy […]

[Original post on secureworld.io]

0 0 0 0
Preview
CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security flaws to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability list is as follows - CVE-2021-22054 (CVSS score: 7.5) - A server-side request forgery (SSRF) vulnerability in Omnissa Workspace One UEM (formerly VMware Workspace One UEM) that

iT4iNT SERVER CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited VDS VPS Cloud #Cybersecurity #Vulnerabilities #CISA #SolarWinds #Ivanti

0 0 0 0
CISA Adds 3 KEVs

~Cisa~
CISA added three actively exploited vulnerabilities (Omnissa, SolarWinds, Ivanti) to the KEV catalog.
-
IOCs: CVE-2021-22054, CVE-2025-26399, CVE-2026-1603
-
#CISA #KEV #ThreatIntel

0 0 0 0
Preview
CISA’dan iOS uyarısı: Federal kurumlara "Yamalayın" emri geldi - AppleBülteni ABD Siber Güvenlik ve Altyapı Güvenliği Ajansı (CISA), federal kurumlara yönelik kritik bir uyarı yayımlayarak, kripto para hırsızlığı ve siber casusluk

CISA’dan iOS uyarısı: Federal kurumlara “Yamalayın” emri geldi

#apple #iOS #cisa

applebulteni.com/2026/03/09/c...

0 0 0 0
Original post on webpronews.com

CISA Adds Three Exploited iOS Vulnerabilities to KEV Catalog CISA added three exploited iOS vulnerabilities—CVE-2026-1234 (WebKit), CVE-2026-5678 (kernel), and CVE-2026-9012 (ImageIO)—to its KE...

#CybersecurityUpdate #MobileDevPro #Apple #security #updates […]

[Original post on webpronews.com]

0 0 0 0

📰 CISA Minta Instansi Federal Segera Tambal Celah iOS yang Dieksploitasi untuk Pencurian Kripto

👉 Baca artikel lengkap di sini: https://ahmandonk.com/2026/03/08/cisa-ios-celah-coruna/

#apple #cisa #ios #keamananSiber #zeroDay

0 0 0 0
Preview
CISA warns of Apple flaws exploited in spyware, crypto-theft attacks CISA ordered U.S. federal agencies to patch three iOS security flaws targeted in cyberespionage and crypto-theft attacks using the Coruna exploit kit.

#CISA warns feds to patch #iOS flaws exploited in #crypto-theft attacks

www.bleepingcomputer.com/news/security/cisa-warns...

#cybersecurity #Apple

0 1 0 0

#Trump took out the Task force to look for #foreign #interventions in elections at #CISA, then he is strolling around and saying China, Venezuela,Iran,Italy,Serbia and Germany intervened in #elections that happened, when they were still in #control. Now he wants measures against foreign election…

0 0 1 0
Post image

CISA adds critical vulnerabilities in Hikvision and Rockwell Automation products to KEV catalog. Organizations urged to update systems promptly. #CyberSecurity #CISA #Hikvision #RockwellAutomation Link: thedailytechfeed.com/cisa-warns-o...

0 0 0 0
Preview
CISA Recommends Encrypted Messaging Apps for Telecom Security As telecom security concerns rise, the importance of encrypted messaging apps has never been clearer. Discover the benefits of using encrypted messaging apps

🚨 CISA is advocating for encrypted messaging apps to enhance telecom security! 🛡️💬 Discover why secure communication is crucial for our safety: innovirtuoso.com/technology/cisas-call-fo... #CyberSecurity #Encryption #CISA

0 0 0 0