MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions
The Last Watchdog
MARCH 4, 2019
Turns out it was possible for a threat actor to flood GLIBC with data , take control of it, and then use it as a launch point for stealing passwords, spying on users and attempting to usurp control of other computers. The first worm of note that accomplished this was Stuxnet.
Let's personalize your content