Supply Chain Attacks in the Age of Cloud Computing: Risks, Mitigations, and the Importance of Securing Back Ends
Common Information
Type | Value |
---|---|
UUID | ef425214-f8cc-4e6b-893f-f8814c9e276c |
Fingerprint | cb89237c3359138d5c3d8465a965447c07dedba3c0ba6c7292d0e3300ac93430 |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | Oct. 26, 2020, 4:38 p.m. |
Added to db | April 14, 2024, 10:53 a.m. |
Last updated | Aug. 30, 2024, 10:52 p.m. |
Headline | Supply Chain Attacks in the Age of Cloud Computing: Risks, Mitigations, and the Importance of Securing Back Ends |
Title | Supply Chain Attacks in the Age of Cloud Computing: Risks, Mitigations, and the Importance of Securing Back Ends |
Detected Hints/Tags/Attributes | 123/1/53 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 2 | cve-2019-10348 |
|
Details | CVE | 2 | cve-2019-10350 |
|
Details | CVE | 2 | cve-2019-10351 |
|
Details | CVE | 1 | cve-2019-10361 |
|
Details | CVE | 1 | cve-2019-10366 |
|
Details | CVE | 2 | cve-2019-10378 |
|
Details | CVE | 2 | cve-2019-10385 |
|
Details | CVE | 1 | cve-2019-10440 |
|
Details | CVE | 1 | cve-2019-10433 |
|
Details | CVE | 2 | cve-2019-5021 |
|
Details | Domain | 245 | shutterstock.com |
|
Details | Domain | 1 | www.netsurion.com |
|
Details | Domain | 53 | blog.avast.com |
|
Details | Domain | 604 | www.trendmicro.com |
|
Details | Domain | 1 | 2018.zeronights.ru |
|
Details | Domain | 177 | blog.trendmicro.com |
|
Details | Domain | 13 | www.jenkins.io |
|
Details | Domain | 6 | plugins.jenkins.io |
|
Details | Domain | 29 | www.cvedetails.com |
|
Details | Domain | 251 | www.bleepingcomputer.com |
|
Details | Domain | 145 | threatpost.com |
|
Details | Domain | 18 | docs.docker.com |
|
Details | Domain | 1373 | twitter.com |
|
Details | Domain | 15 | blog.aquasec.com |
|
Details | Domain | 71 | kubernetes.io |
|
Details | Domain | 26 | azure.microsoft.com |
|
Details | Domain | 6 | code.visualstudio.com |
|
Details | File | 1 | unsecured-redis-instances-found-in-the-cloud.html |
|
Details | File | 1 | 15-redis-post-exploitation.pdf |
|
Details | File | 1 | exposed-redis-instances-abused-for-remote-code-execution-cryptocurrency-mining.html |
|
Details | File | 1 | jenkins-script-security.html |
|
Details | File | 17 | docs.doc |
|
Details | File | 4 | security-risks-in-online-coding-platforms.html |
|
Details | Url | 1 | https://www.netsurion.com |
|
Details | Url | 1 | https://blog.avast.com/ccleaner-fights-off-cyberespionage-attempt-abiss. |
|
Details | Url | 1 | https://www.trendmicro.com/en_us/research/20/d/more-than-8-000- |
|
Details | Url | 1 | https://2018.zeronights.ru/wp- |
|
Details | Url | 26 | https://www.trendmicro.com |
|
Details | Url | 12 | https://blog.trendmicro.com/trendlabs- |
|
Details | Url | 1 | https://www.jenkins.io/security |
|
Details | Url | 1 | https://plugins.jenkins.io/script-security/. |
|
Details | Url | 1 | https://www.cvedetails.com/product/35997/jenkins-script-security.html?vendor_id=15865 |
|
Details | Url | 1 | https://www.bleepingcomputer.com/news/security/17-backdoored-docker-images-removed- |
|
Details | Url | 1 | https://threatpost.com/alpine-linux-docker-images-unlocked/. |
|
Details | Url | 1 | https://docs.docker.com/engine/security/rootless/. |
|
Details | Url | 1 | https://twitter.com/_fel1x |
|
Details | Url | 1 | https://blog.trendmicro.com/trendlabs-security-intelligence/why- |
|
Details | Url | 2 | https://blog.aquasec.com/threat-alert-kinsing-malware-container-vulnerability. |
|
Details | Url | 1 | https://www.trendmicro.com/vinfo/us/security/news/virtualization-and-cloud/guidance-on-kubernetes-threat- |
|
Details | Url | 4 | https://www.trendmicro.com/en_us/research/20/c/security-risks-in-online-coding-platforms.html |
|
Details | Url | 1 | https://kubernetes.io/docs/concepts |
|
Details | Url | 3 | https://azure.microsoft.com |
|
Details | Url | 1 | https://code.visualstudio.com/api/working- |