• lmmarsano@lemmynsfw.com
    link
    fedilink
    English
    arrow-up
    11
    arrow-down
    2
    ·
    edit-2
    15 hours ago

    I own you!
    take ownership & full access of all resources
    threat actor exploits a vulnerable application that is (1) running as you to (2) access resources it doesn’t need: they commandeer your system

    how did that happen?

    🤔