Aquasec

OPA Gatekeeper Bypass Reveals Risks in Kubernetes Policy Engines

OPA Gatekeeper is an essential tool that provides out-of-the-box security policies for Kubernetes, but Aqua Security’s research highlights critical flaws that may allow attackers to evade restrictions.

300,000+ Prometheus Servers and Exporters Exposed to DoS Attacks

Researchers found that exposed Prometheus servers or exporters, often lacking proper authentication, allowed attackers to easily gather sensitive information, such as credentials and API keys.
October 28, 2024

Notorious Hacker Group TeamTNT Launches New Cloud Attacks for Crypto Mining

The TeamTNT cryptojacking group is preparing for a new large-scale campaign targeting cloud-native environments to mine cryptocurrencies and rent out breached servers to third parties.

New Linux Malware "Hadooken' Targets Oracle WebLogic Applications

A new Linux malware named Hadooken is targeting Oracle WebLogic servers, dropping Tsunami malware and deploying a cryptominer. WebLogic servers are vulnerable to cyberattacks due to flaws like deserialization and weak access controls.

PG_MEM Malware Targets PostgreSQL Databases for Crypto Mining

Cryptojacking attackers are targeting poorly secured PostgreSQL databases on Linux systems. According to Aqua Security researchers, the attack begins with brute-force attempts to gain access to the database credentials.

New Discord DDoS Campaign Called Panamorfi Targets Vulnerable Jupyter Notebooks

Hackers are targeting misconfigured Jupyter Notebooks using a repurposed Minecraft DDoS tool known as mineping. The attack, dubbed Panamorfi, involves utilizing a Java tool to launch a TCP flood DDoS attack against vulnerable Jupyter Notebooks.

Kubernetes Exposed: Exploiting the Kubelet API

Real-world attacks have been observed where attackers target the Kubelet API to steal secrets and gain control over clusters. Various techniques, such as environment discovery, network scanning, and secrets collection, have been utilized by hackers.

Phantom Secrets: Undetected Secrets Expose Major Corporations

Major secrets, including cloud environment credentials, internal infrastructures, and telemetry platforms, have been found exposed on the internet due to Git-based processes and Source Code Management (SCM) platforms behavior.

Muhstik Malware Targets Message Queuing Services Applications

A remote code execution vulnerability, CVE-2023-33246, was discovered for RocketMQ versions 5.1.0 and below, allowing attackers to execute commands within the system using the update configuration function.

The Hidden Dangers Within Ubuntu's Package Suggestion System

The interaction between Ubuntu’s command-not-found package and the snap package repository poses a significant security risk, potentially leading to the recommendation of malicious packages to users.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags