“Particularly concerning was the discovery of exposed biometric templates and facial recognition data in several modern access control systems, which could pose serious privacy…
Tag:
Misconfigured
-
-
From rootkits to cryptomining In the attack chain against Hadoop, the attackers first exploit the misconfiguration to create a new application on the cluster…
-
Application SecurityNewsSecurity
Misconfigured Docker API endpoints allow attackers to deliver DDoS botnet agent
The oracle.sh executable was originally written in Python code and was compiled with Cython (C-Extensions for Python). The code implements several different DDoS methods…
-
Network SecurityNewsSecurity
Thousands of misconfigured container and artifact registries expose sensitive credentials
Researchers have found thousands of publicly exposed and misconfigured container registries and artifact repositories belonging to businesses that could give attackers access to access…
-
Mobile Apps ReviewsNewsReviews
UpGuard Discovers 38M Records Leaked From 1,000-Plus Misconfigured Web Apps
UpGuard has revealed that over 1,000 web apps leaked more than 38 million records containing names, COVID-19 tracing information, and other personal data because…