Looking for:
Citrix receiver hackSecure sensitive data while your employees work from home - Citrix receiver hack
Ok, so a user can copy files from the remote system, why is this a security issue? Especially if you are a low privileged user on the system. What could they possibly do with that? They could overwrite binaries that are executed by the user or operating system. This binary is called daily as a scheduled task.
The virtualization services provider said it's aware of a "small number of targeted attacks in the wild" using the flaw, urging customers to apply the latest patch to unmitigated systems. Last year, Mandiant revealed espionage activity targeting verticals that aligned with government priorities outlined in China's 14th Five-Year Plan.
Microsoft, last month, pointed out Chinese threat actors' history of discovering and using zero days to their advantage before being picked up by other adversarial collectives in the wild. Found this article interesting? Yandex data breach reveals source code littered with racist language. European partners expect growth this year, here are three ways they will achieve it. IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission.
Learn more. News Security hacking.
❿
No comments:
Post a Comment