Home Tags Root

Tag: Root

A vulnerability in the web-based GUI of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to perform unauthorized remote command execution on the affected device. The vulnerability exists because the affe...
The chip giant believes it has found the root cause of the issue forcing Haswell and Broadwell chips to unexpectedly reboot.
NEWS ANALYSIS: Intel says it has discovered the root cause of random processor reboots and updated the list of affected systems, which appears to be nearly all of them.
A vulnerability in the administrative shell of the Cisco Email Security Appliance (ESA) and Content Security Management Appliance (SMA) could allow an authenticated, local attacker to escalate their privilege level and gain root access.

The attacke...
A vulnerability in the CLI of the Cisco StarOS operating system for Cisco ASR 5000 Series routers could allow an authenticated, local attacker to execute arbitrary commands with root privileges on an affected host operating system. The vulnerabili...
Skygofree is among the most powerful spy platforms ever created for Android.
Backups of virtual machines on some hosts could be accessed or altered by an attacker.
And two other security bugs VMware on Tuesday published a security advisory for its vSphere Data Protection (VDP) backup and recovery product.…
A researcher with the Twitter handle ‘Siguza’ published details of a macOS local privilege escalation vulnerability dating back to 2002 that could give an attacker root access to systems.
In an earlier publication we noted that cybercriminals were making use of social engineering to install this sort of software on usersrsquo; computers.

This time, wersquo;d like to dwell more on how exactly the computers of gullible users start working for cybercriminals.

Jack of all trades

Among this array of threats we found a rather interesting sample – Trojan.AndroidOS.Loapi.

This Trojan boasts a complicated modular architecture that means it can conduct a variety of malicious activities: mine cryptocurrencies, annoy users with constant ads, launch DDoS attacks from the affected device and much more.