updated Thu. September 19, 2024
-
TechTarget
February 21, 2017
The BENIGNCERTAIN exploit affects certain versions of Cisco systems using the IKEv1 protocol. Expert Nick Lewis explains what the protocol ...
TechTarget
September 20, 2016
Cisco warns that an as-yet unpatched vulnerability derived from Shadow Brokers' BENIGNCERTAIN hacking tool is being exploited in the wild.
PCWorld
August 25, 2016
A third exploit, BenignCertain, affects legacy Cisco PIX firewalls that are no longer supported. Cisco investigated the exploit and said only ...
BankInfoSecurity.com
August 24, 2016
One target of an Equation Group attack tool - named BENIGNCERTAIN - are Cisco PIX devices. But intelligence agencies are not the only ones targeting ...
TechTarget
August 23, 2016
The BENIGNCERTAIN exploit, revealed by former black hat hacker and current security researcher Mustafa Al-Bassam, is a remote exploit for ...
DatacenterDynamics (registration)
August 23, 2016
Some 15,000 PIX devices, built from at least 2002 to 2008, still remain in use, mostly in Russia; Cisco says the BENIGNCERTAIN tool impacts ...
Threatpost
August 22, 2016
Late last week, researcher Mustafa Al-Bassam tackled a another Equation Group exploit in the dump called BENIGNCERTAIN. This one targets ...
BankInfoSecurity.com
August 22, 2016
But in recent days, researchers have made a new discovery: An exploit called BENIGNCERTAIN allowed the NSA to decrypt any traffic being handled by Cisco ...
Ars Technica
August 19, 2016
The discovery is significant because the attack code, dubbed BenignCertain, worked on PIX versions Cisco released in 2002 and supported ...
Motherboard
August 19, 2016
Security researcher Mustafa Al-Bassam first documented the hacking tool, which uses the codename BENIGNCERTAIN, in a blog post published Thursday.
TechTarget
February 21, 2017
The BENIGNCERTAIN exploit affects certain versions of Cisco systems using the IKEv1 protocol. Expert Nick Lewis explains what the protocolÃÂ ...
TechTarget
September 20, 2016
Cisco warns that an as-yet unpatched vulnerability derived from Shadow Brokers' BENIGNCERTAIN hacking tool is being exploited in the wild.
BankInfoSecurity.com
August 25, 2016
... including EGREGIOUSBLUNDER, targeting Fortinet-built Fortigate devices; BENIGNCERTAIN, targeting Cisco PIX devices; as well as other tools designed toÃÂ ...
PCWorld
August 25, 2016
A third exploit, BenignCertain, affects legacy Cisco PIX firewalls that are no longer supported. Cisco investigated the exploit and said onlyÃÂ ...
PCWorld
August 25, 2016
A third exploit, BenignCertain, affects legacy Cisco PIX firewalls that are no longer supported. Cisco investigated the exploit and said onlyÃÂ ...
BankInfoSecurity.com
August 25, 2016
... Fortigate devices; BENIGNCERTAIN, targeting Cisco PIX devices; as well as other tools designed to exploit Juniper and Topsec equipment.
BankInfoSecurity.com
August 24, 2016
One target of an Equation Group attack tool - named BENIGNCERTAIN - are Cisco PIX devices. But intelligence agencies are not the only ones targetingÃÂ ...
BankInfoSecurity.com
August 24, 2016
One target of an Equation Group attack tool - named BENIGNCERTAIN - are Cisco PIX devices. But intelligence agencies are not the only onesÃÂ ...
DatacenterDynamics (registration)
August 23, 2016
Some 15,000 PIX devices, built from at least 2002 to 2008, still remain in use, mostly in Russia; Cisco says the BENIGNCERTAIN tool impactsÃÂ ...
TechTarget
August 23, 2016
The BENIGNCERTAIN exploit, revealed by former black hat hacker and current security researcher Mustafa Al-Bassam, is a remote exploit forÃÂ ...
BankInfoSecurity.com
August 22, 2016
But in recent days, researchers have made a new discovery: An exploit called BENIGNCERTAIN allowed the NSA to decrypt any traffic being handled by CiscoÃÂ ...
Threatpost
August 22, 2016
Late last week, researcher Mustafa Al-Bassam tackled a another Equation Group exploit in the dump called BENIGNCERTAIN. This one targetsÃÂ ...
BankInfoSecurity.com
August 22, 2016
But in recent days, researchers have made a new discovery: An exploit called BENIGNCERTAIN allowed the NSA to decrypt any traffic beingÃÂ ...
Motherboard
August 19, 2016
Security researcher Mustafa Al-Bassam first documented the hacking tool, which uses the codename BENIGNCERTAIN, in a blog post published Thursday.
Ars Technica
August 19, 2016
The discovery is significant because the attack code, dubbed BenignCertain, worked on PIX versions Cisco released in 2002 and supportedÃÂ ...
DAWN.com
December 31, 1999
Although the print media (Urdu papers in particular) has largely remained benign, certain stories in the English newspapers may have causedÃÂ ...
TechTarget
February 21, 2017
The BENIGNCERTAIN exploit revealed in the Shadow Brokers' data dump of the National Security Agency's (NSA) cyberweapons and zero-day exploits could allow an unauthenticated remote attacker to send an Internet Key Exchange (IKE) packet to aÃÂ ...
OODA Loop
September 23, 2016
"Cisco Systems' security team announced Friday some of the company's firewall customers have been hacked using a vulnerability exposed by the Shadow Brokers group.
Networks Asia
September 21, 2016
One of the Equation group's exploits, dubbed BENIGNCERTAIN, exploited a vulnerability in legacy Cisco PIX firewalls and inspired Cisco's security team to search for similar flaws in other devices.
The Merkle
September 21, 2016
The new exploit was named BENIGNCERTAIN and its made up of three binary codes. Each code can be exploited to obtain RSA private key data and VPN configurations details if exploited.
TechTarget
September 20, 2016
The new vulnerability is based on the BENIGNCERTAIN exploit leaked in the Shadow Brokers' dump last month, which affected Cisco's legacy PIX firewall line.
International Business Times UK
September 20, 2016
The latest vulnerability targeting all Cisco IOS and PIX is called "BENIGNCERTAIN" and consists of three binaries, each of which is a separate step in the exploit process, which can be leveraged by attackers to acquire VPN configuration and RSA private ...
InfoWorld
August 27, 2016
A third exploit, BenignCertain, affects legacy Cisco PIX firewalls that are no longer supported. Cisco investigated the exploit and said only versions 6.x and earlier of the PIX software are affected.
SC Magazine
August 27, 2016
Last week, the company issued an advisory confirming that the BenignCertain exploit affects 6.x and earlier versions of Cisco's PIX firewall products.
PCWorld
August 25, 2016
A third exploit, BenignCertain, affects legacy Cisco PIX firewalls that are no longer supported. Cisco investigated the exploit and said only versions 6.x and earlier of the PIX software are affected.
Computerworld
August 25, 2016
A third exploit, BenignCertain, affects legacy Cisco PIX firewalls that are no longer supported. Cisco investigated the exploit and said only versions 6.x and earlier of the PIX software are affected.
BankInfoSecurity.com
August 24, 2016
One target of an Equation Group attack tool - named BENIGNCERTAIN - are Cisco PIX devices. But intelligence agencies are not the only ones targeting vulnerable equipment.
DatacenterDynamics (registration)
August 23, 2016
Meanwhile, legacy Cisco PIX security appliances may be vulnerable to a different tool. Some 15,000 PIX devices, built from at least 2002 to 2008, still remain in use, mostly in Russia; Cisco says the BENIGNCERTAIN tool impacts "PIX versions 6.x and prior.
In Homeland Security
August 22, 2016
In reality, the NSA, and now anyone who downloads the malware, can leverage this so-called BENIGNCERTAIN exploit to steal the passwords to these firewalls and thus spy on all supposedly secure traffic running through them, according to a recent articleÃÂ ...
Threatpost
August 22, 2016
Late last week, researcher Mustafa Al-Bassam tackled a another Equation Group exploit in the dump called BENIGNCERTAIN. This one targets Cisco PIX firewalls that are no longer supported by the company.
BankInfoSecurity.com
August 22, 2016
But in recent days, researchers have made a new discovery: An exploit called BENIGNCERTAIN allowed the NSA to decrypt any traffic being handled by Cisco PIX devices - including devices set to function as VPNs - from at least 2002 to 2008, according toÃÂ ...
Ars Technica
August 20, 2016
The discovery is significant because the attack code, dubbed BenignCertain, worked on PIX versions Cisco released in 2002 and supported through 2009.
Motherboard
August 19, 2016
Security researcher Mustafa Al-Bassam first documented the hacking tool, which uses the codename BENIGNCERTAIN, in a blog post published Thursday.
DDay.it
December 31, 1999
BenignCertain, questo il nome del programma usato per l'attacco, sfrutta un baco del Cisco Adaptive Security Appliance (usato sui comuni firewall PIX 6.X di Cisco distribuiti dal 2002 al 2009 e su altri firewall): un utente poteva autenticarsi senza ...