A local privilege escalation bug in the Polkit Linux component could allow an attacker to gain root privileges with a simple exploit.
The White House has outlined a number of cybersecurity measures that federal agencies must adopt - as part of an overall zero-trust strategy - though it acknowledges that the transition "will not be a quick or easy task."
Timo Steffens, private security researcher and author of Attribution of Advanced Persistent Threats, discusses some of the top roadblocks that researchers face during attribution.
Researchers found an announcement on an underground forum for LockBit Linux-ESXi Locker version 1.0 in October.
Three remote code execution bugs in the PrinterLogic platform have been patched. The bugs could allow an attacker to run arbitrary code on any connected endpoint.