Ivanti warns of new Connect Secure flaw used in zero-day attacks

By Lawrence Abrams Ivanti is warning that hackers exploited a Connect Secure remote code execution vulnerability tracked as CVE-2025-0282 in zero-day attacks to install malware on appliances. The company says it became aware of the vulnerabilities after the Ivanti Integrity Checker Tool (ICT) detected malicious activity on customers’ appliances. Ivanti launched an investigation and confirmed that threat actors were actively exploiting CVE-2025-0282 as a zero-day. CVE-2025-0282 is a critical (9.0) stack-based buffer […]

read more

White House Plan to Secure Smart Devices Highlights Connected Economy Vulnerabilities

By PYMNTS  |  January 9, 2025 Digital transformation is a double-edged sword. From cloud computing and Internet of Things (IoT) to artificial intelligence-driven analytics and real-time payment systems, the connectivity ushered in by technological advances has unlocked opportunities for innovation and growth. The more connected the economy becomes, however, the more vulnerabilities there are for fraudsters to exploit. This makes cybersecurity increasingly crucial, as evidenced by the White House deploying a Cyber Trust Mark for connected consumer devices Tuesday […]

read more

US Treasury hacked: Are China and the US stepping up their cyberwar?

Department of the Treasury calls cyberattack a ‘major incident’, accuses China-backed hackers. By Sarah Shamim The United States Department of the Treasury on Monday blamed China for breaching its network and gaining access to information that includes unclassified documents. Beijing has denied the allegation, calling it “groundless”. Keep reading list of 4 items list 1 of 4 US says ‘Salt Typhoon’ Chinese hacking group behind major metadata theft list 2 of 4 Did […]

read more

30th December – Threat Intelligence Report

TOP ATTACKS AND BREACHES The Clop ransomware gang exploited a zero-day vulnerability (CVE-2024-50623) in Cleo’s Secure File Transfer products and is extorting 66 companies following alleged data theft. The attackers have given the victims 48 hours to initiate ransom negotiations before publicly disclosing their identities. This incident mirrors Clop’s previous exploitation of zero-day flaws in platforms like Accellion FTA, GoAnywhere MFT, and MOVEit Transfer. Check Point Harmony Endpoint, Threat Emulation and IPS […]

read more

Top 10 Cyber Attacks of 2024

By Guru Baran The year 2024 witnessed a surge in cyber-attacks, with incidents targeting critical infrastructure, healthcare, financial institutions, and even political campaigns. These attacks highlight the growing sophistication of threat actors and the vulnerabilities across industries. Below is a detailed list of the top 10 cyber-attacks of 2024 based on their scale, impact, and geopolitical significance. Key Takeaways from 2024 Cybersecurity Trends Healthcare Under Siege: Ransomware gangs increasingly targeted healthcare […]

read more
Trustpilot
The rating of livingsafeonline.com at Trustprofile Reviews is 9.1/10 based on 13 reviews.
A note to our visitors

This website has updated its privacy policy in compliance with changes to European Union data protection law, for all members globally. We’ve also updated our Privacy Policy to give you more information about your rights and responsibilities with respect to your privacy and personal information. Please read this to review the updates about which cookies we use and what information we collect on our site. By continuing to use this site, you are agreeing to our updated privacy policy.