Remove Data breaches Remove Honeypots Remove Libraries
article thumbnail

Apache Log4j Zero Day Exploit Puts Large Number of Servers at Severe Risk

eSecurity Planet

We’ve seen similar vulnerabilities exploited before in breaches like the 2017 Equifax data breach.”. Deutsche Telekom officials said in a tweet that they “are observing attacks in our honeypot infrastructure coming from the TOR network.”. Anybody using Apache Struts is likely vulnerable.

Risk 135
article thumbnail

Vulnerability Recap 7/15/24 – Industry Patches vs Flaw Exploits

eSecurity Planet

Within 24 hours, exploits began attacking honeypot servers with remote access trojans, bitcoin miners, and DDoS botnets. Inadequate validation of user inputs causes these vulnerabilities, resulting in system takeovers, code execution, and data breaches. Notable malware include Gh0st RAT, RedTail, XMRig, and the Muhstik botnet.