In a recent report, Google-owned Mandiant revealed that a Chinese cyber espionage group, UNC3886, has been exploiting a critical vulnerability in VMware’s vCenter Server as a zero-day since late 2021. The vulnerability, tracked as CVE-2023-34048, allows a malicious actor with network access to vCenter Server to gain privileged access to the system. UNC3886 has a history of utilizing zero-day vulnerabilities to remain undetected while completing their missions. In addition to targeting VMware, the group has also taken advantage of a path traversal flaw in Fortinet FortiOS software. VMware vCenter Server users are advised to update to the latest version to mitigate any potential threats.
Chinese Hackers Covertly Armed VMware Bug, Silent for 2 Years
Latest from News
City sues dark web researcher over ransomware warning in Columbus
TLDR: Columbus, Ohio experienced a major cyberattack by the Rhysida Group, suspected to be linked to Russia. Dark web expert Connor Goodwolf warned the
WETEX 2024 showcasing cutting-edge cybersecurity tech and trends
TLDR: Key Points: WETEX 2024 will spotlight latest cybersecurity technologies and trends. Top showcases include companies specializing in digital transformation, sustainability, and smart grids.
UK huddles countries to discuss worldwide cybersecurity
TLDR: UK convenes nations for talks on global cybersecurity Talks will focus on strengthening global cybersecurity workforces and developing new professional standards Article Summary:
Deadline approaching: Update your Microsoft Windows by October 1st
TLDR: CISA has mandated that three Windows vulnerabilities be patched before October 1 to protect against active exploitation by threat actors. The vulnerabilities impact
Kawasaki hit by cyber attack, RansomHub tagged as culprits
TLDR: Key Points: Kawasaki Motors Europe (KME) confirms cyber attack in early September, causing temporary disruptions. Ransomware gang RansomHub claims responsibility for the attack,