Advertisement

watchTowr Labs

Person on ladder looking into large folder with messy paperwork spilling out. (Stock illustration/Getty Images)
Person on ladder looking into large folder with messy paperwork spilling out. (Stock illustration/Getty Images)

Worries mount over max-severity GoAnywhere defect

Forta, the vendor behind the file-transfer service software, has yet to report exploitation or address evidence of compromise. Independent researchers say otherwise.
A logo sign outside of the headquarters of Ivanti in South Jordan, Utah. (Kristoffer Tripplaar / Alamy Stock Photo)

Questions mount as Ivanti tackles another round of zero-days

The besieged security vendor maintains the latest exploited vulnerabilities in its products are entirely linked to unspecified security issues in open-source libraries. Some researchers aren’t buying it.
Advertisement
In a post published Wednesday, watchTowr Labs CEO Benjamin Harris and researcher Aliz Hammond said they have successfully identified entry points into thousands of live backdoors being used by hackers through the interconnected infrastructure they leave behind. (Image Source: Getty Images)

Malicious hackers have their own shadow IT problem

Researchers at watchTowr Labs found that abandoned and expired internet infrastructure left by hacking groups can function as backdoors within other backdoors.
Advertisement
Advertisement