Jenkins Exploit Mines Cryptocurrencies https://isc.sans.edu/forums/diary/Vulnerable+Apache+Jenkins+exploited+in+the+wild/24916/ Confluence Vulnerablity Exploited to Delivery Cryptocurrency Miner with Rootkit https://blog.trendmicro.com/trendlabs-security-intelligence/cve-2019-3396-redux-confluence-vulnerability-exploited-to-deliver-cryptocurrency-miner-with-rootkit/ Cisco Elastic Services Controller REST API Authentication Bypass https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190507-esc-authbypass Google Chrome History Manipulation Prevention https://groups.google.com/a/chromium.org/forum/?#!msg/blink-dev/T8d4_BRb2xQ/WSdOiOFcBAAJ
show moreAuthor | Johannes Ullrich |
Website | - |
Tags |
Copyright 2024 - Spreaker Inc. an iHeartMedia Company
Browse Spreaker Catalogue to discover great new content
Browse Spreaker Catalogue to discover great new content
It's so quiet here...
Time to discover new episodes!