Prevalence (%)
Incidents
Optimeyes data leakMeow database server campaignTsunami targeting Jenkins and WeblogicFrom S3 bucket to Jenkins credential dumpFrom code commit to production takeoverngrok cryptojacking campaignCommuteAir exposed JenkinsMisconfigured Jenkins Servers Used for CryptominingBORN Group supply chain attack
Last edited
May 21, 2024 2:18 PM
CISA KEV
Metasploit
Nuclei
No. Incidents
6
Techniques