Vulnerabilities
Vulnerability is a weakness in an IT system that can be exploited by an attacker to deliver a successful attack. They can occur through flaws, features or user error, and attackers will look to exploit any of them, often combining one or more, to achieve their end goal.
New Luna Ransomware Infecting Windows, Linux and ESXi Endpoints
A new ransomware family dubbed Luna can be used to encrypt devices running several operating systems, including Windows, Linux, and ESXi systems.
Oops.. AWS S3 Bucket Config Error Exposes 3TB of Sensitive Airport Data
A misconfigured Amazon S3 bucket resulted in 3TB of airport data (more than 1.5 million files) being publicly accessible, open, and without an authentication requirement for access, highlighting the dangers of unsecured cloud infrastructure within the travel sector.
Log4Shell Still Being Exploited to Hack VMWare Servers to Exfiltrate Sensitive Data
"Since December 2021, multiple threat actor groups have exploited Log4Shell on unpatched, public-facing VMware Horizon and [Unified Access Gateway] servers," the agencies said. "
June 2022: VMware Releases ESXi 6.7/7.0 Critical Patch Updates
Critical: VMware ESXi 6.7, Patch Release ESXi670-202206001 Release Date: JUN 14, 2022
Containers are Epic: Still Beware of the Security Risks
In this article, we outline how containers contributed to agile development, which unique security risks containers bring into the picture ...
Huh? Run Malware on iPhone Even When it's OFF?
A first-of-its-kind security analysis of iOS Find My function has identified a novel attack surface that makes it possible to tamper with the firmware and load malware onto a Bluetooth chip that's executed while an iPhone is "off."