A critical vulnerability in BeyondTrust Remote Support is facing an increase in threat activity, with hackers deploying SparkRAT and vShell backdoors and using remote management tools to conduct ...
Federal authorities and industry officials are urging healthcare sector entities to address a critical flaw in BeyondTrust Remote Support and Privileged Remote ...
The identity and access security vendor said that ‘a limited number of Remote Support SaaS customers’ were impacted in an attack this month. Identity and access security vendor BeyondTrust disclosed ...
Add Yahoo as a preferred source to see more of our stories on Google. This story was originally published on Cybersecurity Dive. To receive daily news and insights, subscribe to our free daily ...
BeyondTrust says it spotted an attack in early December 2024 It found some of its Remote Support SaaS instances were ...
To learn more about our editorial approach, explore The Direct Message methodology. In December 2024, cybersecurity firm BeyondTrust confirmed it had suffered a cyberattack targeting its Remote ...
Recently, U.S. lawmakers announced that the United States Treasury had fallen victim to a cyberattack. Evidently, the U.S. Treasury cyberattack was related to the Treasury’s use of BeyondTrust, a ...
Enterprises are urged to patch self-hosted versions of both Remote Support and Privileged Remote Access due to a 9.9-severity vulnerability that could lead to system compromise. Companies using ...
The Cybersecurity and Infrastructure Security Agency (CISA) is urging federal agencies to patch a command injection flaw tracked as CVE-2024-12686, otherwise known as BT24-11, and has added it to the ...
Attackers who exploited a zero-day vulnerability in BeyondTrust Privileged Remote Access and Remote Support products in December likely also exploited a previously unknown SQL injection flaw in ...
Admins managing PCs in companies with BeyondTrust Remote Support or Privileged Remote Access should update their remote support software immediately. Attackers are currently exploiting a vulnerability ...