Popular posts from this blog
Linux Privilege Escalation From Misconfiguration by Anand M
INTRODUCTION History: Computer systems are designed for the use of multiple activities and multiple users. Privileges mean what a user is permitted to do on the system. Privileges include read and write files, execute, or modifying system files. Privilege escalation means a user receives privileges they are not entitled to do. These privileges can be used to delete files, view private information, install unwanted programs such as viruses, Trojan, malware, etc. When a system has a bug that allows security to be bypassed, alternatively, it has flawed design assumptions about how it will be used to leverage the access to gain major root access. Privilege escalation is the act of exploiting a bug, design flaw or configuration oversight in an operating system and software and misconfigurations to gain elevated access to resources that are normally protected from an application side or end user. An application with more privileges than intended by the application developer and system adm...
Japan predicts hacker attack on Tokyo Summer Olympics by Russian hackers
According to Masatoshi Fujitani, head of the Tokyo-based Japan Forum for Strategic Studies (JFSS), the Summer Olympic Games in Tokyo will be the target of violent cyberattacks. He is expecting a hacker attack from Russia. Mr. Fujitani, a former top police officer in Japan, published an article in the online publication JB Press, based on the reasoning around the hacker group DarkSide, allegedly involved in the attack on the biggest US petrol pipeline Colonial Pipeline and allegedly linked to Russia. He believes that "a Russian hacker group is targeting the Tokyo Olympics." "In Japan, we have already started training "white hackers" and creating government hacker organizations," noted the Japanese expert. The head of the JFSS calls on developed countries such as Japan, the United States and the United Kingdom to unite and take decisive action in collaboration with public and private specialized organizations working in the field of cyber defense. Summ...
Comments
Post a Comment