Reply to post: Re: "look at their 'requested' documentation"

Klepto Zepto could steal millions in looming ransomware wave

Charles 9

Re: "look at their 'requested' documentation"

Build a sandbox, someone builds a breakout exploit. Use least privilege, someone finds a way to escalate the privilege by exploiting something that routinely uses the high privilege.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon