In the last newsletter, we discussed the inconvenience of router misconfiguration and the percentage of problems it causes for outages in IP-based networks. In order to look at the security impact of ...
Cloud misconfigurations expose organizations to significant risk, according to a new analysis of Amazon Web Services (AWS) Simple Storage Service (S3) buckets conducted by Lightspin, a cloud security ...
Researchers discovered many instances of misconfigured or outdated Apache Airflow servers over the web leaking sensitive information, including user credentials to well-known services. Apache Airflow ...
The never-before-seen Xanthe cryptomining botnet has been targeting misconfigured Docker APIs. Researchers have discovered a Monero cryptomining botnet they call Xanthe, which has been exploiting ...
A misconfigured Microsoft application allowed anyone to log in and modify Bing.com search results in real-time, as well as inject XSS attacks to potentially breach the accounts of Office 365 users.
Security researchers spot new campaign targeting Docker instances The attack deploys a cloud crypto miner, and a worm for further propagation The miner generates the Dero currency Hackers are building ...
A global operation called Emeraldwhale has targeted misconfigured Git configurations, resulting in the theft of over 15,000 cloud service credentials. According to the Sysdig Threat Research Team (TRT ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results