root access

Report: More Attacks Aimed at Android Devices Configured with Root Access
A report published today by Zimperium, a provider of a platform for securing mobile devices and applications, today finds devices running the Android operating system that have enabled root-level privileges are 3.5 ...
Security Boulevard

Drupal Patches Highly Critical Remote Code Execution Vulnerability
Lucian Constantin | | critical vulnerability, Directory Traversal, Drupal, Remote Code Execution, root access, security patch
Websites based on the Drupal content management system might be affected by a highly critical vulnerability that could result in remote code execution. The vulnerability affects websites running Drupal 8 with RESTful ...
Security Boulevard

Attackers Inject Persistent Cryptomining in Browsers
Lucian Constantin | | Advanced Recording Format, browser abuse, Cisco WebEx, cryptomining, drive-by attack, file sharing, JavaScript mining, macOS High Sierra, malvertizing, Monero, pop-under, Remote Code Execution, root access, vulnerability, WebEx Network Recording Player, WebEx Recording Format
Attackers have found a new technique to make cryptocurrency mining, or cryptomining, inside browsers persistent, or at least survive normal attempts of closing the browser window. Drive-by cryptomining has become widespread in ...

Apple Fixes MacOS High Sierra Root Access Vulnerability
Lucian Constantin | | Amazon S3, Apple, authentication bypass, blank password, cloud leak, credential validation failure, Data leak, INSCOM, macOS High Sierra, misconfiguration, nsa, Red Disk, root access, root password, storage bucket, third-party vendor, virtual appliance, vulnerability
Apple has released an emergency fix for an embarrassing vulnerability that allowed people to access the highest privileges account on Mac computers without a password. The vulnerability was disclosed by a user ...