In the last newsletter, we discussed the inconvenience of router misconfiguration and the percentage of problems it causes for outages in IP-based networks. In order to look at the security impact of ...
Cloud misconfigurations expose organizations to significant risk, according to a new analysis of Amazon Web Services (AWS) Simple Storage Service (S3) buckets conducted by Lightspin, a cloud security ...
Researchers discovered many instances of misconfigured or outdated Apache Airflow servers over the web leaking sensitive information, including user credentials to well-known services. Apache Airflow ...
The never-before-seen Xanthe cryptomining botnet has been targeting misconfigured Docker APIs. Researchers have discovered a Monero cryptomining botnet they call Xanthe, which has been exploiting ...
A misconfigured Microsoft application allowed anyone to log in and modify Bing.com search results in real-time, as well as inject XSS attacks to potentially breach the accounts of Office 365 users.
Security researchers spot new campaign targeting Docker instances The attack deploys a cloud crypto miner, and a worm for further propagation The miner generates the Dero currency Hackers are building ...
A global operation called Emeraldwhale has targeted misconfigured Git configurations, resulting in the theft of over 15,000 cloud service credentials. According to the Sysdig Threat Research Team (TRT ...