The move was promised last year after a Chinese hacking group stole U.S. government emails. It “will take time” to make the logs freely available to other organizations.
Two vulnerabilities in Ivanti Connect Secure VPN devices can be chained together by a threat actor to craft malicious requests and execute arbitrary commands on the system.
The US Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) catalogue to include two actively exploited bugs flaws found in Google Chrome and open-source Perl library.