AdvertisementNorth Korea held a military parade at Kim Il Sung Square in Pyongyang, the capital, on Wednesday, according to the North’s state media Korean Central...
WP Engine: Web hosting has grown exponentially with the need for organizations and even individuals to represent their brand in a digital space. And who can blame them? It is a much more efficient way to share information by publishing it for the world to see than sharing information in ones and twos. Whether sharing […]
The memory corruption vulnerability in a policy component installed by default on most Linux distributions allows any user to become root. Researchers have already reproduced the exploit.
Qualys security researchers warn of an easily exploitable privilege escalation vulnerability in polkit’s pkexec, a SUID-root program found in all Linux distributions.
A 12-year-old security vulnerability has been disclosed in a system utility called Polkit that grants attackers root privileges on Linux systems, even as a proof-of-concept (PoC) exploit has emerged in the wild merely hours after technical details of the bug became public.
Dubbed "PwnKit" by cybersecurity firm Qualys, the weakness impacts a component in polkit called pkexec, a program that's