Hurry up patching those Oracle bugs? Attackers aren't waiting

www.theregister.co.uk | 5/3/2018 | Staff
tictac399 (Posted by) Level 3
Click For Photo: https://regmedia.co.uk/2016/11/02/shutterstock_patch.jpg?x=1200&y=794

Security experts are advising administrators to and installing Oracle patches after finding that attackers are quick to target their vulnerabilities.

The Sans Institute issued a warning after one of its honeypot systems was targeted by exploits of the CVE-2018-2628 remote code execution flaw in WebLogic just hours after the test server was put live.

Sans - Flaw - Oracle - April - Security

According to Sans, the flaw has been aggressively targeted since it was first disclosed by Oracle on April 18. The security training company says it took all of three hours after the patch was released for the first compromised servers to be detected.

Since then, Sans says, attacks have become so prevalent that new systems will be hit with exploit attempts almost immediately after coming online. To underscore this, Sans researchers set a vulnerable server live earlier this week and monitored attempts to exploit the flaw.

Hours

Within three hours of going...
(Excerpt) Read more at: www.theregister.co.uk
Wake Up To Breaking News!
Sign In or Register to comment.

Welcome to Long Room!

Where The World Finds Its News!