Container infrastructure can be exploited in under one hour

Criminals are having a field day with misconfigured containers, installing cryptocurrency miners and various backdoors without breaking a sweat. According to a new report from Aqua Security Software, it takes less than an hour to compromise vulnerable software container infrastructure.  As reported by Silicon Angle, attackers are using bots to target misconfigured Docker APIs and are capable of gaining access …

Tovább a bejegyzéshez

Fortinet FortiOS flaws actively exploited in the wild

FortiOS, an operating system built by enterprise security provider Fortinet, has a number of high-severity flaws that are currently being exploited in the wild, US government agencies are saying. The FBI and the US Cybersecurity and Infrastructure Security Agency (CISA) have issued a joint warning, explaining that three different vulnerabilities (CVE-2018-13379, CVE-2020-12812 and CVE-2019-5591) are being abused by hackers. FortiOS …

Tovább a bejegyzéshez