Tag: system privileges
-
The Register: HTTP your way into Citrix’s Virtual Apps and Desktops with fresh exploit code
Source URL: https://www.theregister.com/2024/11/12/http_citrix_vuln/ Source: The Register Title: HTTP your way into Citrix’s Virtual Apps and Desktops with fresh exploit code Feedly Summary: ‘Once again, we’ve lost a little more faith in the internet,’ researcher says Researchers are publicizing a proof of concept (PoC) exploit for what they’re calling an unauthenticated remote code execution (RCE) vulnerability…
-
Hacker News: Windows 0-day was exploited by North Korea to install advanced rootkit
Source URL: https://arstechnica.com/security/2024/08/windows-0-day-was-exploited-by-north-korea-to-install-advanced-rootkit/ Source: Hacker News Title: Windows 0-day was exploited by North Korea to install advanced rootkit Feedly Summary: Comments AI Summary and Description: Yes Summary: The text highlights a critical Windows zero-day vulnerability (CVE-2024-38193) exploited by the North Korean hacking group Lazarus to install advanced rootkit malware (FudModule). This sophisticated attack allows the…