Hackers attack Confluence Servers, hijack power for cryptocurrency mining

By |September 8, 2019|Tech News|

Hackers Target Confluence Servers for Illicit Cryptocurrency Mining Hackers have recently launched attacks on Confluence Servers to exploit their resources for illicit cryptocurrency mining, primarily targeting Monero. According to Trend Micro, the attackers are taking advantage of CVE-2019–3396, a vulnerability within the Widget Connector macro of Atlassian Confluence Server. This flaw allows for [...]

Comments Off on Hackers attack Confluence Servers, hijack power for cryptocurrency mining

Linux Kernel Prior to 5.0.8 Vulnerable to Remote Code Execution

By |August 31, 2019|Tech News|

The vulnerability affecting Linux kernels prior to version 5.0.8, identified as CVE-2019-11815, is a significant security flaw. It is a race condition leading to a use-after-free error in the net/rds/tcp.c file, which can be exploited for remote code execution (RCE) and denial-of-service (DoS) attacks. This vulnerability arises when the system attempts to reference [...]

Comments Off on Linux Kernel Prior to 5.0.8 Vulnerable to Remote Code Execution
Go to Top