In a statement, the company said it urged customers to take immediate action to update their software. He did not provide further details about the violations, which he said date back to earlier this year.

Cyber ​​security
In its post, Cisco warned that it has seen evidence that UAT4356 hackers are interested in “and potentially attacking” network devices from Microsoft and other vendors. File image

Reuters Washington

Technology firm Cisco Systems said hackers have destroyed some of its digital security equipment to gain access to government networks globally.

In a blog post published Wednesday, the company said its adaptive security appliances — pieces of equipment that roll several different digital defense functions into one — had previously unknown vulnerabilities that were exploited by a group of hackers. What they called “UAT4356”.

Click here to connect with us on WhatsApp.

The blog post described the group as “a sophisticated state-sponsored actor” and said the company’s investigation found victims who were “involved in government networks globally.” Cisco said the vulnerabilities have been fixed.

In a statement, the company said it urged users to “take immediate action” to update their software. He did not provide further details about the violations, which he said date back to earlier this year.

Security devices such as routers and other so-called edge devices have become increasingly popular vectors for advanced hackers because they remain on the perimeter of a target’s network and can be difficult to monitor.

In its post, Cisco warned that it has seen evidence that UAT4356 hackers are interested in “and potentially attacking” network devices from Microsoft and other vendors.

Microsoft did not immediately return an email.

The Cybersecurity and Infrastructure Security Agency (CISA) said it had “no confirmed evidence of activity affecting US government networks at this time.” CISA issued an alert on Cisco vulnerabilities on Wednesday.

(Only the headline and image for this report may have been reworked by Business Standard staff; the rest of the content was generated automatically from a syndicated feed.)



Source link