News
ConnectWise, the developer of remote access and support software ScreenConnect, has disclosed that it was the victim of a cyber attack that it said was likely perpetrated by a nation-state threat ...
Gotham Security, an Abacus Group company providing high-quality boutique cybersecurity services, has announced that its research team recently discovered two vulnerabilities in ConnectWise ...
Two new vulnerabilities impact ConnectWise ScreenConnect, remote desktop and access software used for support: CVE-2024-1709 and CVE-2024-1708, with the former being particularly dangerous for ...
A ScreenConnect license revocation has also been implemented which has, ... Hammond, however, believes the exploitation to be a large cyberattack.
The North Korean APT hacking group Kimsuky is exploiting ScreenConnect flaws, particularly CVE-2024-1708 and CVE-2024-1709, to infect targets with a new malware variant dubbed ToddlerShark.
While ConnectWise has not connected a specific vulnerability to the nation-state breach, in April, the vendor disclosed and patched CVE-2025-3935, which affects ScreenConnect versions prior to 25.2.4.
Shodan currently tracks over 8,659 ScreenConnect servers, with only 980 running the ScreenConnect 23.9.8 patched version. Internet-exposed ScreenConnect servers (Shodan) Exploited in LockBit ...
A critical vulnerability patched this week in the ConnectWise ScreenConnect remote desktop software is already being exploited in the wild. Researchers warn that it’s trivial to exploit the flaw ...
On Feb. 13, ConnectWise reported vulnerabilities found in its ScreenConnect tool that impacted both cloud and on-prem instances. The Tampa, Fla.-based vendor notified partners via the ConnectWise ...
You may like ConnectWise hit by nation-state cyberattack, some ScreenConnect customer systems affected; LockBit ransomware gang gets hacked, leak exposes negotiations with victims ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results