Browsing tag

Exploiting

Active campaign exploiting Apache Struts 2 vulnerability

A Monero mining script is spreading using remote command execution vulnerability It seemed a matter of time before attacks like these happened in the wild, and they have already been seen. According to reports of ethical hacking specialists, a well-known malicious actor has deployed a great cryptocurrency mining campaign using the remote code execution vulnerability […]

Exploiting .NET Managed DCOM

One of the more interesting classes of security vulnerabilities are those affecting interoperability technology. This is because these vulnerabilities typically affect any application using the technology, regardless of what the application actually does. Also in many cases they’re difficult for a developer to mitigate outside of not using that technology, something which isn’t always possible. […]