MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions
The Last Watchdog
MARCH 4, 2019
Turns out it was possible for a threat actor to flood GLIBC with data , take control of it, and then use it as a launch point for stealing passwords, spying on users and attempting to usurp control of other computers. Privilege account credentials are widely available for sale. The first worm of note that accomplished this was Stuxnet.
Let's personalize your content