US Treasury breach - US Secretary of Treasury Computer Hacked: U.S. Treasury Secretary Janet Yellen's computer was hacked, along with the computers of two of her deputies, as part of a broader ...
A recent breach of the US Treasury yielded access to Secretary Janet Yellen's computer along with those of two of her ...
The details of the hack were in a letter shared by Reuters, which advised that on Dec. 8, the Treasury Department was notified by a third-party software provider, BeyondTrust Corp., that a threat ...
Treasury was alerted on December 8th by software contractor BeyondTrust Corp., prompting a response involving the FBI and Cybersecurity and Infrastructure Security Agency. China denies allegations ...
The US Cybersecurity and Infrastructure Security Agency (CISA) has added to its catalog of known exploited vulnerabilities a second vulnerability by BeyondTrust, which was patched in December.
Atlanta-based Bomgar has agreed to purchase Phoenix, Az.-based BeyondTrust, creating an 800-employee privilege security behemoth with more than 19,000 customers and $300 million in combined annual ...
BeyondTrust, a Johns Creek-based software vendor, notified Treasury on Dec. 8 that a threat actor had obtained access to a digital key BeyondTrust uses to provide remote tech support for the ...
The China-linked breach is tied to the compromise of BeyondTrust’s remote support tool and reportedly led to the breach of multiple offices within the Treasury Department. New details have ...
CISA has tagged a command injection vulnerability (CVE-2024-12686) in BeyondTrust's Privileged Remote Access (PRA) and Remote Support (RS) as actively exploited in attacks. As mandated by the ...
The US Cybersecurity and Infrastructure Security Agency (CISA) has added two recently-discovered BeyondTrust bugs to its Known Exploited Vulnerabilities (KEV) catalog. The move means CISA has seen ...
The US security authority CISA warns of attacks on remote access software from BeyondTrust and the data analysis solution Qlik Sense Enterprise. In the latter case, remote attacks are possible ...