Exploitation of kernel vulnerabilities – Apple Updated
The vulnerabilities addressed in Apple’s recent updates were likely exploited by state-sponsored advanced persistent threats (APTs), cybercriminal organizations, hacktivist groups, and freelance hackers. The methods of exploitation and specific actors involved are detailed below. Exploitation of kernel vulnerabilities allowed attackers to create writable memory mappings or leak kernel state information, enabling privilege escalation and evasion…
Read More “Exploitation of kernel vulnerabilities – Apple Updated” »

You must be logged in to post a comment.