Dmitry Artimovich, who on several occasions had been referred to as a “Russian hacker” by the world’s largest news publications (The New York Times, Associated Press), has published the book “ONLINE PAYMENT SOLUTIONS: The evolution of Visa and MasterCard. Regulation and development of payment systems in Europe” In the first Russian […]
Daily archives: February 21, 2019
In January 2019, current versions of Ubuntu Linux were found to be vulnerable to local privilege escalation due to a bug in the snapd API. This repository contains the original exploit POC, which is being made available for research and education. For a detailed walkthrough of the vulnerability and the […]
The remote execution flaw exists because some field types do not properly sanitize data from non-form sources and this can be exploited to achieve arbitrary PHP code execution. It is deemed highly critical because it can be exploited by unauthenticated attackers and only requires easily achievable user interaction (a visit […]
Linux Kernel is prone to an arbitrary code-execution vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the kernel. Failed exploits may result in denial-of-service conditions. The Kernel Address Sanitizer (KASAN) that detects dynamic memory errors within the Linux kernel code has just picked […]
The fundamental challenge of cybersecurity is not new. They have existed as long as computers have been used in sensitive applications in various industries. Industries face these issues following their level of dependency on computer technology on different timescales and context. Likewise in the automotive sector, the potential capabilities fueled by connected technology offer […]