Cyberveilleby Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
9 résultats taggé akamai  ✕
Can't Be Contained: Finding a Command Injection Vulnerability in Kubernetes https://www.akamai.com/blog/security-research/kubernetes-critical-vulnerability-command-injection
15/09/2023 16:34:42
QRCode
archive.org
thumbnail

Akamai researchers discover a critical vulnerability in Kubernetes that can lead to remote code execution.

akamai EN 2023 Kubernetes command-injection vulnerability YAML rce remote-code-execution
New Magecart-Style Campaign Abusing Legitimate Websites to Attack Others | Akamai https://www.akamai.com/blog/security-research/new-magecart-hides-behind-legit-domains
05/06/2023 09:00:06
QRCode
archive.org
thumbnail

Akamai researchers have identified a new Magecart-style skimmer campaign that hides behind legitimate website domains to steal PII and credit card information.

akamai EN 2023 Research Magecart skimmer campaign WP
The Race to Patch: Attackers Leverage Sample Exploit Code in Wordpress Plugin | Akamai https://www.akamai.com/blog/security-research/attackers-leverage-sample-exploit-wordpress-plugin
14/05/2023 17:20:39
QRCode
archive.org
thumbnail

The time for attackers to respond to known vulnerabilities is shrinking. See an example of an attacker using sample code.

  • The Akamai Security Intelligence Group (SIG) has been analyzing attack attempt activity following the announcement of a critical vulnerability in a WordPress custom fields plug-in affecting more than 2 million sites.

  • Exploiting this vulnerability could lead to a reflected cross-site scripting (XSS) attack, in which malicious code is injected into a victim site and pushed to its visitors.

  • On May 4, 2023, the WP Engine team announced the security fix in version 6.1.6, including sample exploit code as a proof of concept (PoC).

  • Starting on May 6, less than 48 hours after the announcement, the SIG observed significant attack attempt activity, scanning for vulnerable sites using the sample code provided in the technical write-up.

  • This highlights that the response time for attackers is rapidly decreasing, increasing the need for vigorous and prompt patch management.

akamai EN 2023 XSS vulnerability WordPress plugin third-party-risk CVE-2023-30777
Magecart Attack Disguised as Google Tag Manager | Akamai https://www.akamai.com/blog/security/magecart-attack-disguised-as-google-tag-manager
20/02/2023 20:36:30
QRCode
archive.org
thumbnail

Magecart skimmers constantly evolve. Recent attacks aimed at stealing sensitive customer information illustrate the need for comprehensive security solutions.

akamai EN 2023 Magecart Page-Integrity-Manager Page-Integrity-Manager Magecart in-browser-security PCI/DSS-compliance skimmers Magecart-attacks
Accidentally Crashing a Botnet https://www.akamai.com/blog/security-research/kmsdbot-part-two-crashing-a-botnet
15/01/2023 16:15:38
QRCode
archive.org
thumbnail

As part of our research into the cryptomining botnet kmsdbot, we rendered it useless.

akamai EN 2022 Security-Research Research Bot-Attacks DDOS Bot-Attacks Cyber-Security Research Security-Research Kmsdbot botnet SIRT cryptomining crash malware
Largest European DDoS Attack on Record https://www.akamai.com/blog/security/largest-european-ddos-attack-ever
29/07/2022 10:18:04
QRCode
archive.org

The risk of distributed denial-of-service attacks (DDoS) has never been greater. Over the past several years, organizations have encountered a deluge of DDoS extortion, novel threats, state-sponsored hacktivism, and unprecedented innovation in the threat landscape.

Akamai DDoS EN 2022 report record Europe
CVE-2022-26143: TP240PhoneHome Reflection/Amplification DDoS Attack Vector https://www.akamai.com/blog/security/phone-home-ddos-attack-vector
09/03/2022 08:57:18
QRCode
archive.org

A new reflection/amplification distributed denial of service (DDoS) vector with a record-breaking potential amplification ratio of 4,294,967,296:1 has been abused by attackers in the wild to launch multiple high-impact DDoS attacks.

CVE-2022-26143 Akamai reflection amplification DDoS attacks EN 2022
UPnProxy: Eternal Silence https://www.akamai.com/blog/security/upnproxy-eternal-silence
11/02/2022 18:39:36
QRCode
archive.org

UPnProxy is alive and well. There are 277,000 devices, out of a pool of 3.5 million, running vulnerable implementations of UPnP. Of those, Akamai can confirm that more than 45,000 have been compromised in a widely distributed UPnP NAT injection campaign.

Akamai EN UPnProxy EternalSilence UPnP
FritzFrog: P2P Botnet Hops Back on the Scene https://www.akamai.com/blog/security/fritzfrog-p2p
11/02/2022 18:37:08
QRCode
archive.org

FritzFrog is a peer-to-peer botnet, which means its command and control server is not limited to a single, centralized machine, but rather can be done from every machine in its distributed network. In other words, every host running the malware process becomes part of the network, and is capable of sending, receiving, and executing the commands to control machines in the network.

FritzFrog botnet EN Akamai
1765 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn - Curated by Decio