It requires kernel level access to abuse, so it will probably be mostly used in targeted attacks. General good technical hygiene should be good enough to prevent becoming a random victim.
this post was submitted on 14 Aug 2024
14 points (88.9% liked)
Cybersecurity
5941 readers
7 users here now
c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.
THE RULES
Instance Rules
- Be respectful. Everyone should feel welcome here.
- No bigotry - including racism, sexism, ableism, homophobia, transphobia, or xenophobia.
- No Ads / Spamming.
- No pornography.
Community Rules
- Idk, keep it semi-professional?
- Nothing illegal. We're all ethical here.
- Rules will be added/redefined as necessary.
If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.
Learn about hacking
Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected]
Notable mention to [email protected]
founded 2 years ago
MODERATORS
Maybe someone will prove me wrong, but I think there is still not enough public information about the vulnerability and the possible mitigations to answer your questions thoroughly.