Researchers at Talos do Internet scans at two times, late February and July to see how many servers are running unpatched versions. The results are surprising.
Scan results in February:
General server on Internet 107,786
Vulnerable server 85.121
The server is vulnerable and requires verification 23,707
The five countries with the most vulnerable servers are the United States, followed by China, Britain, France and Germany.
Scan results in July:
Total server on Internet 106.001
Vulnerable server 73,403
Vulnerable server and need of 18,012 authentication
After comparing the results of the two scans, the researchers found that only 2,958 servers were vulnerable to the scan in February before patching before July, while the rest were still vulnerable to remote hacking.
Data theft and ransomware hazards
It is very important for organizations to ignore this patch, and Talos researchers warn that this vulnerable Memcached will be the target of ransomware attacks similar to the one that attacked. MongoDB database at the end of December.
Although unlike Mongo DB, Memcached is not a database, but it still contains sensitive information and interferes with the service, which can lead to other obstacles on independent service.
The error on Memcached will allow hackers to replace the saved content with malicious content to change the website content, create phishing sites, extort money, poison the link, attack the victim computer, bring hundreds of millions of users. into a dangerous state.
'As more and more computer worms exploit vulnerabilities, this needs to be alarmed with administrators around the world,' the researchers concluded. 'Untreated weaknesses when exploited can affect organizations worldwide, affecting serious work. These systems should be patched immediately to minimize risks'.
if you use multiple macs, perhaps one in the office and one at home, you'll sometimes need to access the other. this will no longer be impossible because a mac allows you to access and control it remotely using a variety of methods.
the telegram application will save all devices that log in to the account in a list for us to monitor. and from this list we can check if there are any unauthorized logins.
want to protect your zalo account from unauthorized access? learn how to log out of your zalo account remotely, a simple yet effective security feature.
the infotainment system of mazda's new generation mazda mzd connect can be hacked just by plugging in the usb, thanks to a lot of known bugs for at least 3 years.
just relying on the strange signs that appear during the use of the computer, you can easily know whether your computer has been attacked or not to find a way to fix it. these are signs that your computer has been hacked.
when hackers attack and gain control, they will try to hide the presence on your system. however, there are still some signs to help you identify the camera system has been hacked.
you plan to hire a server service to build a website for small businesses, but you need to know the basics of network servers. the whole purpose and total characteristics of a website are the factors that form the server selection