Click For Photo: https://regmedia.co.uk/2016/11/02/shutterstock_patch.jpg?x=1200&y=794
Security experts are advising administrators to and installing Oracle patches after finding that attackers are quick to target their vulnerabilities.
The Sans Institute issued a warning after one of its honeypot systems was targeted by exploits of the CVE-2018-2628 remote code execution flaw in WebLogic just hours after the test server was put live.
Sans - Flaw - Oracle - April - Security
According to Sans, the flaw has been aggressively targeted since it was first disclosed by Oracle on April 18. The security training company says it took all of three hours after the patch was released for the first compromised servers to be detected.
Since then, Sans says, attacks have become so prevalent that new systems will be hit with exploit attempts almost immediately after coming online. To underscore this, Sans researchers set a vulnerable server live earlier this week and monitored attempts to exploit the flaw.
Within three hours of going...
Wake Up To Breaking News!