CISA: Ivanti Vulns Chained Together in Cyberattack OnslaughtBy rooter / January 23, 2025 The threat actors are abusing the vulnerabilities to gain initial access, obtain credentials, and install malicious scripts on user devices.