Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED


1 Tiffany Yu — Smashing Stereotypes and Building a Disability-Inclusive World 30:23
Tomcat Manager Attacks: 400 IPs in Coordinated Brute-Force Attack
Manage episode 488236924 series 3645080
On June 5, 2025, GreyNoise flagged a massive spike in coordinated brute-force login attempts targeting Apache Tomcat Manager interfaces. Nearly 400 unique IP addresses, many traced back to DigitalOcean infrastructure, were involved in a widespread and opportunistic campaign. In this episode, we dissect the attack pattern, what makes Apache Tomcat a recurring target, and why this surge should be treated as an early warning signal—not just random noise.
We go deep into the authentication and configuration weaknesses that attackers exploit and walk through concrete hardening steps every Tomcat admin should implement—starting with strong password hashing (like Argon2id), multi-factor authentication, and locking down management interfaces. We also highlight specific Tomcat security configurations—from Realms and RemoteAddrValve tuning to disabling TRACE, SSLv3, and limiting directory listings.
The discussion also covers essential logging and incident response measures, such as setting up AccessLogValve, conducting regular log analysis, enabling secure session management, and building a living incident response plan. Whether you’re running a public-facing Tomcat server or managing multiple internal environments, this episode offers a focused breakdown of proactive defense strategies to secure against both opportunistic and targeted threats.
Tune in to learn how to defend your systems before they become someone else’s reconnaissance experiment.
200 episodes
Manage episode 488236924 series 3645080
On June 5, 2025, GreyNoise flagged a massive spike in coordinated brute-force login attempts targeting Apache Tomcat Manager interfaces. Nearly 400 unique IP addresses, many traced back to DigitalOcean infrastructure, were involved in a widespread and opportunistic campaign. In this episode, we dissect the attack pattern, what makes Apache Tomcat a recurring target, and why this surge should be treated as an early warning signal—not just random noise.
We go deep into the authentication and configuration weaknesses that attackers exploit and walk through concrete hardening steps every Tomcat admin should implement—starting with strong password hashing (like Argon2id), multi-factor authentication, and locking down management interfaces. We also highlight specific Tomcat security configurations—from Realms and RemoteAddrValve tuning to disabling TRACE, SSLv3, and limiting directory listings.
The discussion also covers essential logging and incident response measures, such as setting up AccessLogValve, conducting regular log analysis, enabling secure session management, and building a living incident response plan. Whether you’re running a public-facing Tomcat server or managing multiple internal environments, this episode offers a focused breakdown of proactive defense strategies to secure against both opportunistic and targeted threats.
Tune in to learn how to defend your systems before they become someone else’s reconnaissance experiment.
200 episodes
All episodes
×
1 Taiwan Sounds the Alarm: TikTok, WeChat, and the Chinese Data Threat 1:06:28

1 The Evolution of Atomic macOS Stealer: Backdoors, Keyloggers, and Persistent Threats 45:00

1 CitrixBleed Returns: CVE-2025-5777 and the Exploitation of NetScaler Devices 1:02:21

1 SAP’s July 2025 Patch Day: Critical Flaws, CVE-2025-30012, and Ransomware Risk 1:02:01

1 106GB Exposed? Telefónica, HellCat, and the Silent Data Breach 50:33

1 Ingram Micro’s SafePay Ransomware Breach: Human-Operated Threats and Supply Chain Fallout 59:56

1 The Illusion of Shutdowns: What Hunters International's Closure Really Means 42:41

1 CISA Flags CVE-2025-6554: Patching Chrome’s Critical Flaw Before It’s Too Late 40:49

1 ANSSI vs. Houken: France Battles Advanced Chinese Hacking Threat 33:16

1 Psychological Manipulation and AI Fraud: How Spain Exposed a $12M Scam 17:21

1 CVE-2025-20309: Critical Cisco Root Access Flaw Threatens VoIP Security 41:32

1 macOS Under Siege: NimDoor Malware Targets Telegram, Wallets, and Keychains 43:09

1 Cisco Unified CM Vulnerability: Root Access Risk for Enterprise VoIP Networks 56:02

1 Forminator Flaw Exposes WordPress Sites to Takeover Attacks: Vulnerability Threatens 600,000+ Sites 50:32

1 Kelly Benefits Breach: Over 550,000 Victims and the Rising Identity Theft Crisis 1:08:04

1 FileFix, HTA, and MotW Bypass—The Alarming Evolution of HTML-Based Attacks 46:04

1 Sophisticated Cyberattack on the International Criminal Court: Justice in the Crosshairs 19:37

1 Critical Flaws in Microsens NMP Web+ Threaten Industrial Network Security 43:40

1 Qantas Data Breach: Third-Party Hack Exposes Millions of Frequent Flyers 24:36

1 Berlin Regulator Targets DeepSeek AI Over Data Transfers to China 43:41

1 CISA Flags Citrix NetScaler Flaws: What CVE-2025-6543 Means for Federal and Private Networks 56:41

1 Cato Networks Secures $359M to Fuel AI-Powered SASE Expansion 17:12

1 Chrome’s Latest Zero-Day: CVE-2025-6554 and Remote Code Execution Risks 54:24

1 Russia’s 16KB Curtain: Cloudflare Throttling and the Future of the RuNet 1:45:31

1 Ahold Delhaize Data Breach: 2.2 Million Employee Records Exposed 37:44

1 Why Canada Banned Hikvision: National Security vs. Geopolitics 52:07

1 Scattered Spider Takes Flight: Inside the Cybercrime Group’s Move into Aviation 43:38

1 Fortnite and the FTC: How Epic Games Misled Players into Unwanted Purchases 54:56

1 Microsoft 365 Direct Send Exploited: How Phishing Emails Masquerade as Internal Messages 41:44

1 Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Risk 47:26

1 CitrixBleed 2: Critical NetScaler Vulnerability Enables Session Hijacking and MFA Bypass 18:41

1 OneClik Cyberattack Campaign Targets Energy Sector Using Microsoft ClickOnce and AWS 1:18:25

1 Central Kentucky Radiology’s 2024 Data Breach Affects 167,000 51:40

1 Bonfy.AI Launches $9.5M Adaptive Content Security Platform to Govern AI and Human Data 1:09:30

1 Zero-Day Level Cisco ISE Flaws: Urgent Patch Required for Enterprise Security 54:30

1 U.S. Government Pushes Back on Meta: WhatsApp Labeled a High-Risk App 45:38

1 How Cyberattacks on Mainline Health and Select Medical Exposed Over 200,000 Patients 45:10

1 The Siemens-Microsoft Antivirus Dilemma Threatening OT Security 1:23:55

1 Prometei Botnet’s Global Surge: A Threat to Linux and Windows Systems Alike 41:20

1 Patient Trust on the Line: The Fallout from McLaren Health Care’s 2024 Breach 44:50

1 NeuralTrust’s Echo Chamber: The AI Jailbreak That Slipped Through the Cracks 56:30

1 AT&T, Verizon, and Beyond: How Salt Typhoon Targets Global Telcos 44:06

1 Fake Microsoft, Netflix, & Apple Support: The Scam Lurking in Google Search 32:40

1 From Malware to Court: Qilin Ransomware’s ‘Call a Lawyer’ Tactic 43:58

1 Zero-Click, Zero-Warning: The FreeType Flaw Behind a Spyware Surge 57:15

1 The Insurance Industry Under Fire: Anatomy of the Aflac Cyber Incident 53:58

1 The Nucor Cyberattack: How Ransomware Threatens American Steel 58:40

1 Inside the $225M Crypto Seizure: How Law Enforcement Traced Illicit Funds Across Borders 1:01:32

1 Inside CVE-2025-23121: Veeam RCE Flaw Opens Door to Ransomware 47:43

1 Fasana’s Collapse: How One Ransomware Attack Crippled a German Manufacturer 41:37

1 Inside the 16 Billion Credential Leak: The Infostealer Engine Behind the Biggest Breach Yet 54:27

1 Over 1,500 Minecraft Users Infected in Stargazers Ghost Malware Campaign 55:17

1 Weaponized GitHub Repositories: How Banana Squad and Water Curse Are Hitting Devs 45:59

1 Chain IQ Breach Exposes UBS & Pictet Employee Data: A Supply Chain Failure 1:05:22

1 Oxford City Council Breach Exposes 21 Years of Data 35:51

1 Citrix NetScaler Flaws Expose Enterprise Networks: CVE-2025-5349 & CVE-2025-5777 38:12

1 GerriScary: How CVE-2025-1568 Threatened Google’s Open-Source Supply Chain 35:21

1 Cisco & Atlassian Under Fire: High-Severity Flaws and What’s at Risk 53:38

1 Double Extortion, Biometric Data, and Donuts: How Play Ransomware Hit Krispy Kreme 50:51

1 Archetyp Market Seized: €250M Drug Empire Toppled by Operation Deep Sentinel 54:53
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.