Attackers Completely Destroy VFEmail’s Secure Mail Infrastructure
“Every file server is lost, every backup server is lost.” Continue reading Attackers Completely Destroy VFEmail’s Secure Mail Infrastructure
Collaborate Disseminate
“Every file server is lost, every backup server is lost.” Continue reading Attackers Completely Destroy VFEmail’s Secure Mail Infrastructure
Unknown attackers have breached the servers of VFEmail and have wiped disks on every one of its US-based servers, the email provider has confirmed. At this time, the attacker has formatted all the disks on every server. Every VM is lost. Every file ser… Continue reading Hackers hit VFEmail, wipe US servers and backups
Researchers have uncovered the first known security flaw in Kubernetes, a popular open-source tool for managing application workloads. Developers published three security updates this week that promised to protect users of Kubernetes, a containerized application system, from a new vulnerability that could make it possible for hackers to inject malicious code or bring down an app from behind an organization’s firewall. Kubernetes runs on top of operating systems, taking commands from an administrator or developer and passing those instructions to nodes throughout an environment. This bug, the first major issue found in Kubernetes, warranted a 9.8 out of 10 severity score on because it could allow outsiders to establish a connection through Kubernetes’ trusted-application program interface to backend servers, ZDNet reported. From there, hackers can use that authentication to send arbitrary or malicious requests disguised under valid Kubernetes credentials, using that access to gain full administrator privileges. Exploiting the flaw […]
The post First major Kubernetes flaw enables hackers to access backend servers undetected appeared first on Cyberscoop.
Continue reading First major Kubernetes flaw enables hackers to access backend servers undetected
Many US companies, including Amazon and Apple, have been the victims of a clever supply chain attack that resulted in compromised hardware (servers) being installed at some of their facilities, an explosive report by Bloomberg claims. A summary The com… Continue reading China allegedly infiltrated US companies through implanted hardware backdoors
Servers are amazing beasts of technology that keep enterprises running. They can handle complex processes well enough for users to not even think about their existence. When servers fail though, they can be disruptive and create a domino effect that c… Continue reading Server Maintenance Checklist: 15 Common Issues and How to Fix Them
Mongo Lock is a new attack that is aimed at MongoDB databases which have no protection and remote access left open. Mongo Lock is a ransomware threat, which wipes these databases and uses extortion tactics like any other ransomware to…Read more
The p… Continue reading Mongo Lock Ransomware Deletes Vulnerable MongoDB Databases
An Aussie high schooler pleaded guilty on Thursday to hacking Apple servers multiple times. Continue reading Apple gets cored: 90GB of ‘secure files’ stolen by high schooler
When you’re a company the size of Facebook with more than two billion users on millions of servers, running thousands of configuration changes every day involving trillions of configuration checks, as you can imagine, configuration is kind of a big deal. As with most things with Facebook, they face scale problems few companies have to […] Continue reading How Facebook configures its millions of servers every day
A malware framework that’s already infected hundreds of thousands of routers across the globe appears to be even more dangerous than originally thought, according to new findings by Cisco’s internal cybersecurity unit Talos. The latest results show that the malware, “VPNFilter,” affects a wider array of devices, including more than 11 different hardware vendors, and carries several previously unknown infection capabilities, such as the potential to manipulate internet traffic on the end device in novel ways. The Talos researchers revealed the additional analysis Wednesday after having first publicly documented the botnet last week. A significant percentage of the devices infected through VPNFilter are based in Ukraine, leading domestic security services to claim that the malware symbolized a national security threat. Broadly speaking, VPNFilter works by traversing the web and automatically targeting unpatched routers and servers that carry outdated software. The term “botnet” is used to describe an army of zombie computers […]
The post Russian-linked VPNFilter malware is even worse than originally thought, new research suggests appeared first on Cyberscoop.
Today, I will be going over Control 5 from version 7 of the CIS top 20 Critical Security Controls – Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers. I will go through the five requirements and… Continue reading 20 Critical Security Controls: Control 5 – Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers