{"id":1316,"date":"2020-05-07T01:47:38","date_gmt":"2020-05-07T01:47:38","guid":{"rendered":"https:\/\/www.infosystem.id\/?p=1316"},"modified":"2020-05-07T01:50:35","modified_gmt":"2020-05-07T01:50:35","slug":"hackers-breach-lineageos-ghost-digicert-servers-using-saltstack-vulnerability","status":"publish","type":"post","link":"https:\/\/infosystem.id\/index.php\/2020\/05\/07\/hackers-breach-lineageos-ghost-digicert-servers-using-saltstack-vulnerability\/","title":{"rendered":"Hackers Breach LineageOS, Ghost, DigiCert Servers Using SaltStack Vulnerability"},"content":{"rendered":"<blockquote><p><a href=\"https:\/\/thehackernews.com\/2020\/05\/saltstack-rce-exploit.html\"><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/www.infosystem.id\/wp-content\/uploads\/2020\/05\/saltstack-salt-rce-vulnerability.jpg\" alt=\"\" \/><\/a>Days after cybersecurity researchers sounded the alarm over two critical vulnerabilities in the SaltStack configuration framework, a hacking campaign has already begun exploiting the flaws to breach servers of LineageOS, Ghost, and DigiCert.<\/p><\/blockquote>\n<p>Source: <em><a href=\"https:\/\/thehackernews.com\/2020\/05\/saltstack-rce-exploit.html\">Hackers Breach LineageOS, Ghost, DigiCert Servers Using SaltStack Vulnerability<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Days after cybersecurity researchers sounded the alarm over two critical vulnerabilities in the SaltStack configuration framework, a hacking campaign has already begun exploiting the flaws to breach servers of LineageOS, Ghost, and DigiCert. Source: Hackers Breach LineageOS, Ghost, DigiCert Servers Using SaltStack Vulnerability<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9,1],"tags":[],"class_list":["post-1316","post","type-post","status-publish","format-standard","hentry","category-news","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/posts\/1316","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/comments?post=1316"}],"version-history":[{"count":1,"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/posts\/1316\/revisions"}],"predecessor-version":[{"id":1318,"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/posts\/1316\/revisions\/1318"}],"wp:attachment":[{"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/media?parent=1316"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/categories?post=1316"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/tags?post=1316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}