
A recently disclosed security flaw in PHP (CVE-2024-4577) is being actively exploited by multiple threat actors to deploy remote access trojans, cryptocurrency miners, and DDoS botnets. Researchers from Akamai have observed numerous attempts to exploit this vulnerability, indicating high exploitability and quick adoption by threat actors. The flaw, reported by Security Affairs and The Hacker News, is being used to spread malware and launch DDoS attacks, posing significant risks to cybersecurity.
.@Akamai researchers observed numerous attempts to exploit a vulnerability in PHP, which they said indicates high exploitability and quick adoption by threat actors. #cybersecurity #infosec #ITsecurity https://t.co/xVSKCVFhvA
Microsoft Melds Identity & SSE With Entra Suite: https://t.co/YlA1oeDadP by darkreading #infosec #cybersecurity #technology #news
Multiple threat actors exploit PHP flaw CVE-2024-4577 to deliver malware: https://t.co/W12Yl3pAaf by Security Affairs #infosec #cybersecurity #technology #news




