Published on: 2025-06-15 20:19:04
Thousands of ASUS wireless routers have been compromised by a botnet that has also been targeting Cisco, D-Link, and Linksys devices. The way in which routers are infected means that they remain under the control of attackers even if the firmware is updated … ASUS wireless routers compromised Security researchers at Greynoise first detected the exploit back in March, but held off on making it public until the industry had time to coordinate a response. GreyNoise has identified an ongoing expl
Keywords: asus compromised firmware greynoise routers
Find related items on AmazonPublished on: 2025-07-23 20:42:00
Facepalm: Supply chain attacks can remain dormant for extended periods before striking their target, but they typically don't take years to achieve their objectives. However, a recently uncovered attack managed to stay undetected for a record-breaking length of time. At least three vendors of e-commerce software tools were compromised in a coordinated supply chain attack dating back at least six years. According to security firm Sansec, the unknown attackers injected a dangerous backdoor into t
Keywords: chain commerce compromised sansec vendors
Find related items on AmazonPublished on: 2025-08-24 00:47:04
Over 16,000 internet-exposed Fortinet devices have been detected as compromised with a new symlink backdoor that allows read-only access to sensitive files on previously compromised devices. This exposure is being reported by threat monitoring platform The Shadowserver Foundation, which initially reported 14,000 devices were exposed. Today, Shadowserver's Piotr Kijewski told BleepingComputer that the cybersecurity organization now detects 16,620 devices impacted by the recently revealed persis
Keywords: access compromised devices files threat
Find related items on AmazonPublished on: 2025-08-31 08:08:54
Fortinet warns that threat actors use a post-exploitation technique that helps them maintain read-only access to previously compromised FortiGate VPN devices even after the original attack vector was patched. Earlier this week, Fortinet began sending emails to customers warning that their FortiGate/FortiOS devices were compromised based on telemetry received from FortiGuard devices. These emails were titled "Notification of device compromise - FortiGate / FortiOS - ** Urgent action required **
Keywords: compromised devices emails fortinet fr
Find related items on AmazonPublished on: 2025-10-13 15:24:46
A supply chain attack on the widely used 'tj-actions/changed-files' GitHub Action, used by 23,000 repositories, potentially allowed threat actors to steal CI/CD secrets from GitHub Actions build logs. The GitHub Action is a very popular automation tool designed for GitHub Actions workflows. It allows developers to identify files changed in a pull request or commit and take actions based on those changes, generally used in testing, workflow triggering, and automated code linting and validation.
Keywords: action actions compromised github secrets
Find related items on AmazonPublished on: 2025-10-14 03:43:02
Arguably, Semgrep is overkill for this case. But Lewis Ardern on our team wrote a Semgrep rule to find usages of tj-actions, which you can run locally (without sending code to the cloud) via: semgrep --config r/10Uz5qo/semgrep.tj-actions-compromised . And if we find more information about what tags & commits are affected, we can update the rule over time to become more precise about whether or not you could be impacted. At time of writing, it looks like all versions are compromised.
Keywords: actions compromised rule semgrep time
Find related items on AmazonGo K’awiil is a project by nerdhub.co that curates technology news from a variety of trusted sources. We built this site because, although news aggregation is incredibly useful, many platforms are cluttered with intrusive ads and heavy JavaScript that can make mobile browsing a hassle. By hand-selecting our favorite tech news outlets, we’ve created a cleaner, more mobile-friendly experience.
Your privacy is important to us. Go K’awiil does not use analytics tools such as Facebook Pixel or Google Analytics. The only tracking occurs through affiliate links to amazon.com, which are tagged with our Amazon affiliate code, helping us earn a small commission.
We are not currently offering ad space. However, if you’re interested in advertising with us, please get in touch at [email protected] and we’ll be happy to review your submission.