|
You are here |
reverse.put.as | ||
| | | | |
theevilbit.github.io
|
|
| | | | | Intro Link to heading The Kandji team is always looking out for how to help keep your devices secure. In line with that, our Threat Research team performed an audit on the macOS diskarbitrationd and storagekitd system daemons, uncovering several vulnerabilities such as sandbox escapes, local privilege escalations, and TCC bypasses. Our team reported all of them to Apple through their responsible disclosure program, and as these are fixed now, we are releasing the details. | |
| | | | |
randomthoughts.greyhats.it
|
|
| | | | | (This post is a joint work with @joystick , see also his blog here ) Nowadays, exploitation of user-level vulnerabilities is becoming mo... | |
| | | | |
malgregator.com
|
|
| | | | | Ubiquiti network devices are being remotely exploited, via port 10001 discovery service. Results in loss of device management, also being used as a weak UDP DDoS amplification attack: 56 bytes in, 206 bytes out. | |
| | | | |
ernest.oppet.it
|
|
| | | Sandworm, by Andy Greenberg This book is the thrilling account of the Ukranian power grid cyber attacks of 2015, and the search for who was behind them. This search takes us through many other attacks also attributed to the same source (Russian intelligence services) and Andy Greenberg skillfully weaves in key context: how the hacks... | ||