MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions
The Last Watchdog
MARCH 4, 2019
Turns out it was possible for a threat actor to flood GLIBC with data , take control of it, and then use it as a launch point for stealing passwords, spying on users and attempting to usurp control of other computers. The first worm of note that accomplished this was Stuxnet. Addressing the exposure.
Let's personalize your content