Listen

Description

Jenkins Exploit Mines Cryptocurrencies

https://isc.sans.edu/forums/diary/Vulnerable+Apache+Jenkins+exploited+in+the+wild/24916/

Confluence Vulnerablity Exploited to Delivery Cryptocurrency Miner with Rootkit

https://blog.trendmicro.com/trendlabs-security-intelligence/cve-2019-3396-redux-confluence-vulnerability-exploited-to-deliver-cryptocurrency-miner-with-rootkit/

Cisco Elastic Services Controller REST API Authentication Bypass

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190507-esc-authbypass

Google Chrome History Manipulation Prevention

https://groups.google.com/a/chromium.org/forum/?#!msg/blink-dev/T8d4_BRb2xQ/WSdOiOFcBAAJ