Lemmy
  • Communities
  • Create Post
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 29 days ago

Critical Linux Vulnerabilities Expose Password Hashes on Millions of Linux Systems Worldwide

cybersecuritynews.com

external-link
message-square
5
fedilink
21
external-link

Critical Linux Vulnerabilities Expose Password Hashes on Millions of Linux Systems Worldwide

cybersecuritynews.com

Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 29 days ago
message-square
5
fedilink
Two critical local information-disclosure vulnerabilities affecting millions of Linux systems worldwide, potentially allowing attackers to extract sensitive password data through core dump manipulation.
  • Christoph Schmees@social.tchncs.de
    link
    fedilink
    arrow-up
    13
    ·
    29 days ago

    @kid

    Much ado about nothing.

    An attacker needs at least physical access to the device. Wow, what a danger.

    cf. “The 10 Immutable Laws Of Security”
    “Law #3: If a bad guy has unrestricted physical access to your computer, it’s not your computer anymore.”
    https://uptakedigital.zendesk.com/hc/en-us/articles/115000412533-10-Immutable-Laws-Of-Security-Version-2-0

    • ClemaX@lemm.ee
      link
      fedilink
      English
      arrow-up
      1
      ·
      28 days ago

      It is an issue in a managed environment such as on corporation or school PCs.

Cybersecurity@sh.itjust.works

cybersecurity@sh.itjust.works

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !cybersecurity@sh.itjust.works

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

  • Be respectful. Everyone should feel welcome here.
  • No bigotry - including racism, sexism, ableism, homophobia, transphobia, or xenophobia.
  • No Ads / Spamming.
  • No pornography.

Community Rules

  • Idk, keep it semi-professional?
  • Nothing illegal. We’re all ethical here.
  • Rules will be added/redefined as necessary.

If you ask someone to hack your “friends” socials you’re just going to get banned so don’t do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 45 users / day
  • 545 users / week
  • 1.32K users / month
  • 4.26K users / 6 months
  • 1 local subscriber
  • 7.68K subscribers
  • 1.29K Posts
  • 1.73K Comments
  • Modlog
  • mods:
  • Kid@sh.itjust.works
  • Lanky_Pomegranate530@midwest.social
  • BE: 0.19.8
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org