Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1190Exploit Public-Facing Application
98%
"attackers rapidly weaponize critical oracle weblogic rce, honeypot study finds a critical oracle weblogic vulnerability was weaponized almost immediately after public exploit code became available, according to a new honeypot - based analysis covering attack activity between janu…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1190Exploit Public-Facing Application
59%
"immediately. key recommendations include : - apply the latest oracle security patches immediately - restrict administrative console access from the internet - disable unnecessary protocols and ports - deploy web application firewall filtering - monitor logs for suspicious activit…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1588.006Vulnerabilities
53%
"attackers rapidly weaponize critical oracle weblogic rce, honeypot study finds a critical oracle weblogic vulnerability was weaponized almost immediately after public exploit code became available, according to a new honeypot - based analysis covering attack activity between janu…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Attackers rapidly exploited a critical Oracle WebLogic RCE flaw the same day exploit code was released, according to a CloudSEK honeypot study