According to the sources, Kubernetes clusters are now actively breached by the Kinsing malware by exploiting known security flaws in container images and misconfigured, exposed PostgreSQL containers. Kinsing, a Linux malware, targets containerized environments for crypto mining, using the compromised server's hardware resources to generate revenue. Also, the threat actors behind Kinsing are known for exploiting known vulnerabilities such as Log4Shell, and, more recently, an Atlassian Confluence RCE to infiltrate targets and establish persistence. According to Microsoft, Kinsing operators exploit vulnerabilities in container images or misconfigured PostgreSQL databases to gain initial access to Linux servers. Threat actors exploit image vulnerabilities to push their payloads remotely via remote code execution flaws. Microsoft Defender for Cloud telemetry indicates that threats are targeting PHPUnit, Liferay, Oracle WebLogic, and WordPress for initial access. Moreover, the hackers scan for CVE-2020-14882, CVE-2020-14750, and CVE-2020-14883, all remote code execution vulnerabilities affecting Oracle's WebLogic. An attack begins by scanning a broad range of IP addresses for an open port matching the WebLogic default port (7001). Furthermore, security experts from Microsoft observed an increase in misconfigured PostgreSQL servers being attacked as the second initial attack pathway. The most common misconfiguration exploited by attackers is the 'trust authentication' setting, which instructs PostgreSQL to assume anyone who can connect to the server is authorized to access the database. In addition, assigning an IP address range that is far too wide may allow the attacker to gain access to the server. Also, Microsoft states that Kubernetes is still vulnerable to ARP (Address Resolution Protocol) poisoning, allowing attackers to spoof apps in the cluster even if IP access is strictly configured.
Apache OFBiz had two critical authentication vulnerabilities, CVE-2026-45434 and CVE-2023-51467, that could be exploited to bypass forced password changes and achieve remote code e...
A large scale supply chain attack codenamed Megalodon targeted GitHub repositories on May 18 2026 resulting in the compromise of more than 5500 repositories within a short span of ...
Researchers have uncovered a large-scale phishing campaign targeting organizations across the United States through fake event invitation emails and websites. The operation, active...