Security researcher IonuÈ› Cernica revealed how commonplace Linux utilities can be weaponized to siphon sensitive data in multi-tenant environments. His talk, “Silent Leaks: Harvesting Secrets from Shared Linux Environments,” exposed that without any root privileges or zero-day exploits, attackers can exploit standard tools”, such as ps, /proc, and temporary file handling”, to harvest database credentials, API keys, and user […] The post Legitimate System Functions Exploited to Steal Secrets in Shared Linux Setups appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
First seen on gbhackers.com
Jump to article: gbhackers.com/legitimate-system-functions-exploited/
![]()

